Exploiting CPU Clock Modulation for Covert Communication Channel (2404.05823v1)
Abstract: Covert channel attacks represent a significant threat to system security, leveraging shared resources to clandestinely transmit information from highly secure systems, thereby violating the system's security policies. These attacks exploit shared resources as communication channels, necessitating resource partitioning and isolation techniques as countermeasures. However, mitigating attacks exploiting modern processors' hardware features to leak information is challenging because successful attacks can conceal the channel's existence. In this paper, we unveil a novel covert channel exploiting the duty cycle modulation feature of modern x86 processors. Specifically, we illustrate how two collaborating processes, a sender and a receiver can manipulate this feature to transmit sensitive information surreptitiously. Our live system implementation demonstrates that this covert channel can achieve a data transfer rate of up to 55.24 bits per second.
- H. Okhravi, S. Bak, and S. T. King, “Design, implementation and evaluation of covert channel attacks,” in 2010 IEEE Intl. Conf. on Technologies for Homeland Security (HST). IEEE, 2010, pp. 481–487.
- D. B. Bartolini, P. Miedl, and L. Thiele, “On the capacity of thermal covert channels in multicores,” in Proceedings of the Eleventh European Conf. on Computer Systems. ACM, 2016, p. 24.
- J. Chen and G. Venkataramani, “Cc-hunter: Uncovering covert timing channels on shared processor hardware,” in 2014 47th Annual IEEE/ACM Intl. Symposium on Microarchitecture, Dec 2014.
- M. Alagappan, J. Rajendran, M. Doroslovački, and G. Venkataramani, “Dfs covert channels on multi-core platforms,” in 2017 IFIP/IEEE Intl. Conf. on Very Large Scale Integration (VLSI-SoC), Oct 2017, pp. 1–6.
- D. Evtyushkin, D. Ponomarev, and N. Abu-Ghazaleh, “Covert channels through branch predictors: A feasibility study,” in Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, ser. HASP ’15. New York, NY, USA: ACM, 2015, pp. 5:1–5:8. [Online]. Available: http://doi.acm.org/10.1145/2768566.2768571
- R. J. Masti, D. Rai, A. Ranganathan, C. Müller, L. Thiele, and S. Capkun, “Thermal covert channels on multi-core platforms,” in Proceedings of the 24th USENIX Conf. on Security Symposium, ser. SEC’15, 2015.
- B. Saltaformaggio, D. Xu, and X. Zhang, “Busmonitor: A hypervisor-based solution for memory bus covert channels,” EuroSec, 2013.
- J. Xiao, Z. Xu, H. Huang, and H. Wang, “Security implications of memory deduplication in a virtualized environment,” in 2013 43rd Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks (DSN). IEEE, 2013, pp. 1–12.
- C. Maurice, C. Neumann, O. Heen, and A. Francillon, “C5: cross-cores cache covert channel,” in Intl. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2015, pp. 46–64.
- F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R. B. Lee, “Last-level cache side-channel attacks are practical,” in 2015 IEEE Symposium on Security and Privacy. IEEE, 2015, pp. 605–622.
- D. Evtyushkin and D. Ponomarev, “Covert channels through random number generator: Mechanisms, capacity estimation and mitigations,” in Proceedings of the 2016 ACM SIGSAC Conf. on computer and communications security. ACM, 2016, pp. 843–857.
- P. Guide, “Intel® 64 and ia-32 architectures software developer’s manual,” 2010.
- B. Lampson, “A note on the confinement problem,” 1973.
- S. K. Khatamifard, L. Wang, S. Köse, and U. R. Karpuzcu, “A new class of covert channels exploiting power management vulnerabilities,” IEEE Computer Architecture Letters, vol. 17, no. 2, pp. 201–204, 2018.
- J. Wu, L. Ding, Y. Wang, and W. Han, “Identification and evaluation of sharing memory covert timing channel in xen virtual machines,” in 2011 IEEE 4th Intl. Conf. on Cloud Computing. IEEE, 2011, pp. 283–291.
- E. M. Benhani and L. Bossuet, “Dvfs as a security failure of trustzone-enabled heterogeneous soc,” in 2018 25th IEEE Intl. Conf. on Electronics, Circuits and Systems (ICECS), Dec 2018, pp. 489–492.
- G. Venkataramani, J. Chen, and M. Doroslovacki, “Detecting hardware covert timing channels,” IEEE Micro, vol. 36, no. 5, Sep. 2016.