Title | PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV |
Author | |
Corresponding Author | Lin,Zhiqiang |
DOI | |
Publication Years | 2023
|
ISSN | 0302-9743
|
EISSN | 1611-3349
|
Source Title | |
Volume | 13959 LNCS
|
Pages | 46-66
|
Abstract | An increasing number of Trusted Execution Environment (TEE) is adopting to a variety of commercial products for protecting data security on the cloud. However, TEEs are still exposed to various side-channel vulnerabilities, such as execution order-based, timing-based, and power-based vulnerabilities. While recent hardware is applying various techniques to mitigate order-based and timing-based side-channel vulnerabilities, power-based side-channel attacks remain a concern of hardware security, especially for the confidential computing settings where the server machines are beyond the control of cloud users. In this paper, we present PwrLeak, an attack framework that exploits AMD’s power reporting interfaces to build power side-channel attacks against AMD Secure Encrypted Virtualization (SEV)-protected VM. We design and implement the attack framework with three general steps: (1) identify the instruction running inside AMD SEV, (2) apply a power interpolator to amplify power consumption, including an emulation-based interpolator for analyzing purposes and a more general interrupt-based interpolator, and (3) infer secrets with various analysis approaches. A case study of using the emulation-based interpolator to infer the whole JPEG images processed by libjpeg demonstrates its ability to help analyze power consumption inside SEV VM. Our end-to-end attacks against Intel’s Integrated Performance Primitives (Intel IPP) library indicates that PwrLeak can be exploited to infer RSA private keys with over 80% accuracy using the interrupt-based interpolator. |
SUSTech Authorship | Others
|
Language | English
|
URL | [Source Record] |
Scopus EID | 2-s2.0-85164251302
|
Data Source | Scopus
|
Citation statistics |
Cited Times [WOS]:0
|
Document Type | Conference paper |
Identifier | http://kc.sustech.edu.cn/handle/2SGJ60CL/560246 |
Affiliation | 1.The Ohio State University,Columbus,43210,United States 2.Southern University of Science and Technology,Shenzhen,Guangdong,518055,China |
Recommended Citation GB/T 7714 |
Wang,Wubing,Li,Mengyuan,Zhang,Yinqian,et al. PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV[C],2023:46-66.
|
Files in This Item: | There are no files associated with this item. |
|
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment