MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization

11/21/2022
by   Chaoqun Shen, et al.
0

Multi-process concurrency is effective in improving program efficiency and maximizing CPU utilization. The correct execution of concurrency is ensured by the mutual exclusion and synchronization mechanism (MESM) that manages the shared hardware and software resources. We propose MES-Attacks, a new set of software-controlled covert channel attacks based on MESM to transmit confidential information. MES-Attacks offer several advantages: 1) the covert channels are constructed at software level and can be deployed on any hardware; 2) closed share of resource ensures the quality of the channels with low interference and makes them hard to be detected; and 3) it utilizes the system's software resources which are abound and hence difficult to isolate. We built covert channels using different MESMs on Windows and Linux, including Event, Timer, FileLockEX, Mutex, Semaphore and flock. Experimental results demonstrate that these covert channels can achieve transmission rate of 13.105 kb/s, 12.383 kb/s, and 6.552 kb/s, respectively in the scenarios of local, cross-sandbox and cross-VM, where the bit error rates are all under 1%.

READ FULL TEXT
research
09/14/2023

Sync+Sync: A Covert Channel Built on fsync with Storage

Scientists have built a variety of covert channels for secretive informa...
research
06/07/2021

Osiris: Automated Discovery of Microarchitectural Side Channels

In the last years, a series of side channels have been discovered on CPU...
research
01/06/2021

Measuring the Impact of Interference Channels on Multicore Avionics

Measurement-based analysis of software timing behavior provides importan...
research
07/24/2023

New Covert and Side Channels Based on Retirement

Intel processors utilize the retirement to orderly retire the micro-ops ...
research
10/16/2019

An Overview of Capacity Results for Synchronization Channels

Synchronization channels, such as the well-known deletion channel, are s...
research
05/01/2020

Prevention of Microarchitectural Covert Channels on an Open-Source 64-bit RISC-V Core

Covert channels enable information leakage across security boundaries of...

Please sign up or login with your details

Forgot password? Click here to reset