Packet Chasing: Spying on Network Packets over a Cache Side-Channel

09/11/2019
by   Mohammadkazem Taram, et al.
0

This paper presents Packet Chasing, an attack on the network that does not require access to the network, and works regardless of the privilege level of the process receiving the packets. A spy process can easily probe and discover the exact cache location of each buffer used by the network driver. Even more useful, it can discover the exact sequence in which those buffers are used to receive packets. This then enables packet frequency and packet sizes to be monitored through cache side channels. This allows both covert channels between a sender and a remote spy with no access to the network, as well as direct attacks that can identify, among other things, the web page access patterns of a victim on the network. In addition to identifying the potential attack, this work proposes a software-based short-term mitigation as well as a light-weight, adaptive, cache partitioning mitigation that blocks the interference of I/O and CPU requests in the last-level cache.

READ FULL TEXT
research
02/13/2019

Towards a Better Indicator for Cache Timing Channels

Recent studies highlighting the vulnerability of computer architecture t...
research
07/18/2023

Age-Based Cache Updating Under Timestomping

We consider a slotted communication system consisting of a source, a cac...
research
03/27/2019

Fundamental Limits of Covert Packet Insertion

Covert communication conceals the existence of the transmission from a w...
research
04/29/2020

Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks

We describe a new class of packet injection attacks called Man-on-the-Si...
research
01/04/2019

Page Cache Attacks

We present a new hardware-agnostic side-channel attack that targets one ...
research
06/06/2019

Lookout for Zombies: Mitigating Flush+Reload Attack on Shared Caches by Monitoring Invalidated Lines

OS-based page sharing is a commonly used optimization in modern systems ...
research
04/24/2018

Cache-aware data structures for packet forwarding tables on general purpose CPUs

Longest prefix matching has long been the bottleneck of the Bloom filter...

Please sign up or login with your details

Forgot password? Click here to reset