Side-Channel Attacks on Optane Persistent Memory

Sihang Liu*, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

There is a constant evolution of technology for cloud environments, including the development of new memory storage technology, such as persistent memory.
The newly-released Intel Optane persistent memory provides high-performance, persistent, and byte-addressable access for storage-class applications in data centers.
While Optane's direct data management is fast and efficient, it is unclear whether it comes with undesirable security implications.
This is problematic, as cloud tenants are physically co-located on the same hardware.

In this paper, we present the first side-channel security analysis of Intel Optane persistent memory.
We reverse-engineer the internal cache hierarchy, cache sizes, associativity, replacement policies, and wear-leveling mechanism of the Optane memory.
Based on this reverse-engineering, we construct four new attack primitives on Optane's internal components.
We then present four case studies using these attack primitives.
First, we present local covert channels based on Optane's internal caching.
Second, we demonstrate a keystroke side-channel attack on a remote user via Intel's Optane-optimized key-value store, pmemkv.
Third, we study a fully remote covert channel through pmemkv.
Fourth, we present our Note Board attack, also through pmemkv, enabling two parties to store and exchange messages covertly across long time gaps and even power cycles of the server.
Finally, we discuss mitigations against our attacks.
Originalspracheenglisch
TitelProceedings of the 32nd USENIX Security Symposium
Herausgeber (Verlag)USENIX Association
ISBN (elektronisch)978-1-939133-37-3
PublikationsstatusVeröffentlicht - 2023
Veranstaltung32nd USENIX Security Symposium: USENIX Security 2023 - Anaheim, USA / Vereinigte Staaten
Dauer: 9 Aug. 202311 Aug. 2023

Konferenz

Konferenz32nd USENIX Security Symposium
KurztitelUSENIX Security '23
Land/GebietUSA / Vereinigte Staaten
OrtAnaheim
Zeitraum9/08/2311/08/23

Fingerprint

Untersuchen Sie die Forschungsthemen von „Side-Channel Attacks on Optane Persistent Memory“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren