Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23221
|View full text |Cite
|
Sign up to set email alerts
|

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries

Abstract: Operating systems use shared memory to improve performance. However, as shown in recent studies, attackers can exploit CPU cache side-channels associated with shared memory to extract sensitive information. The attacks that were previously attempted typically only detect the presence of a certain operation and require significant manual analysis to identify and evaluate their effectiveness. Moreover, very few of them target graphics libraries which are commonly used, but difficult to attack. In this paper, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(30 citation statements)
references
References 26 publications
(26 reference statements)
0
28
0
Order By: Relevance
“…Cache attacks exploit the access-time differences for cached and uncached data. Since their introduction in 1996 [59], they have been used for powerful attacks on cryptographic primitives [59], [77], [98], [7], [80], [76], user interactions [89], [62], [108], or as building blocks for transientexecution attacks [64], [58], [13].…”
Section: A Cache Attacksmentioning
confidence: 99%

Dynamic Process Isolation

Schwarzl,
Borrello,
Kogler
et al. 2021
Preprint
“…Cache attacks exploit the access-time differences for cached and uncached data. Since their introduction in 1996 [59], they have been used for powerful attacks on cryptographic primitives [59], [77], [98], [7], [80], [76], user interactions [89], [62], [108], or as building blocks for transientexecution attacks [64], [58], [13].…”
Section: A Cache Attacksmentioning
confidence: 99%

Dynamic Process Isolation

Schwarzl,
Borrello,
Kogler
et al. 2021
Preprint
“…Mobile CPU caches have also been exploited for side channel attacks, to infer coarse-grained user activities [15,31]. Some recent work further demonstrated the possibility of inferring users' PIN inputs from knowledge about cache behaviors [53], but only achieved low accuracy (30%). In contrast, our proposed attack achieves much higher accuracy (>80%) without requiring any guess, and hence has higher applicability in practical systems.…”
Section: Moving Circles and Trianglesmentioning
confidence: 99%
“…Existing hardware eavesdropping attacks on smartphones mainly focus on CPU and on-board sensors. For example, access time on CPU cache provides information about victim applications when they contend for cache accesses [13,15,53], and IMU sensor readings could be used to infer users' keystrokes [1,2,26,33,35,39]. However, the correlations between these hardware data and user activities are usually weak and ambiguous, and are susceptible to various system factors and random noise in practice [25].…”
Section: Introductionmentioning
confidence: 99%
“…Prior keystroke recovery attacks have targeted procf [48], audio [70], CPU scheduling [71], Wi-Fi Signals [72], interrupts [73] and graphic renderings [74]. Song et al [47] were the first to use SSH network packets to exploit interleaving times for password recovery, using a Hidden Markov Model (HMM) to model character pairs.…”
Section: Keystroke Attacksmentioning
confidence: 99%