Title
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
Abstract
Modern x86 processors have many prefetch instructions that can be used by programmers to boost performance. However, these instructions may also cause security problems. In particular, we found that on Intel processors, there are two security flaws in the implementation of PREFETCHW, an instruction for accelerating future writes. First, this instruction can execute on data with read-only permission. Second, the execution time of this instruction leaks the current coherence state of the target data. Based on these two design issues, we build two cross-core private cache attacks that work with both inclusive and non-inclusive LLCs, named Prefetch+Reload and Prefetch+Prefetch. We demonstrate the significance of our attacks in different scenarios. First, in the covert channel case, Prefetch+Reload and Prefetch+Prefetch achieve 782 KB/s and 822 KB/s channel capacities, when using only one shared cache line between the sender and receiver, the largest-to-date single-line capacities for CPU cache covert channels. Further, in the side channel case, our attacks can monitor the access pattern of the victim on the same processor, with almost zero error rate. We show that they can be used to leak private information of real-world applications such as cryptographic keys. Finally, our attacks can be used in transient execution attacks in order to leak more secrets within the transient window than prior work. From the experimental results, our attacks allow leaking about 2 times as many secret bytes, compared to Flush+Reload, which is widely used in transient execution attacks.
Year
DOI
Venue
2022
10.1109/SP46214.2022.9833692
2022 IEEE Symposium on Security and Privacy (SP)
Keywords
DocType
ISSN
cache security,side channel attacks
Conference
1081-6011
ISBN
Citations 
PageRank 
978-1-6654-1317-6
1
0.35
References 
Authors
0
4
Name
Order
Citations
PageRank
Yanan Guo121.37
Andrew Zigerelli231.37
Youtao Zhang31977122.84
Jun Yang42762241.66