Sync+Sync: A Covert Channel Built on fsync with Storage

09/14/2023
by   Qisheng Jiang, et al.
0

Scientists have built a variety of covert channels for secretive information transmission with CPU cache and main memory. In this paper, we turn to a lower level in the memory hierarchy, i.e., persistent storage. Most programs store intermediate or eventual results in the form of files and some of them call fsync to synchronously persist a file with storage device for orderly persistence. Our quantitative study shows that one program would undergo significantly longer response time for fsync call if the other program is concurrently calling fsync, although they do not share any data. We further find that, concurrent fsync calls contend at multiple levels of storage stack due to sharing software structures (e.g., Ext4's journal) and hardware resources (e.g., disk's I/O dispatch queue). We accordingly build a covert channel named Sync+Sync. Sync+Sync delivers a transmission bandwidth of 20,000 bits per second at an error rate of about 0.40 cross-disk partition, cross-file system, cross-container, cross-virtual machine, and even cross-disk drive fashions, without sharing data between programs. Next, we launch side-channel attacks with Sync+Sync and manage to precisely detect operations of a victim database (e.g., insert/update and B-Tree node split). We also leverage Sync+Sync to distinguish applications and websites with high accuracy by detecting and analyzing their fsync frequencies and flushed data volumes. These attacks are useful to support further fine-grained information leakage.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/21/2022

MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization

Multi-process concurrency is effective in improving program efficiency a...
research
12/06/2013

File System - A Component of Operating System

The file system provides the mechanism for online storage and access to ...
research
01/26/2022

Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication

We consider the problem of sharing sensitive or valuable files across us...
research
01/04/2019

File System in Data-Centric Computing

The moving computation on the edge or near to data is the new trend that...
research
12/18/2022

FileDAG: A Multi-Version Decentralized Storage Network Built on DAG-based Blockchain

Decentralized Storage Networks (DSNs) can gather storage resources from ...
research
03/05/2021

Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical

We introduce the first microarchitectural side channel attacks that leve...
research
07/31/2023

AisLSM: Revolutionizing the Compaction with Asynchronous I/Os for LSM-tree

The log-structured merge tree (LSM-tree) is widely employed to build key...

Please sign up or login with your details

Forgot password? Click here to reset