Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks

Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks

Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks Shengjian Guo Meng Wu Chao Wang Virginia Tech Virginia Tech University of Southern California Blacksburg, VA, USA Blacksburg, VA, USA Los Angeles, CA, USA ABSTRACT The timing characteristics of cache, a high-speed storage between Program P Adversarial the fast CPU and the slow memory, may reveal sensitive information (Thread T1) Thread Schedule of a program, thus allowing an adversary to conduct side-channel attacks. Existing methods for detecting timing leaks either ignore Concurrent Pro- Symbolic Cache-timing ′′ SMT Solving cache all together or focus only on passive leaks generated by the gram P Execution Leakage program itself, without considering leaks that are made possible by concurrently running some other threads. In this work, we show Program P′ Adversarial Cache that timing-leak-freedom is not a compositional property: a program (Thread T2) Cache Modeling Configuration that is not leaky when running alone may become leaky when inter- leaved with other threads. Thus, we develop a new method, named Figure 1: Flow of our cache timing leak detector SymSC. adversarial symbolic execution, to detect such leaks. It systematically explores both the feasible program paths and their interleavings while modeling the cache, and leverages an SMT solver to decide if are caused by differences in the number and type of instructions there are timing leaks. We have implemented our method in LLVM executed along different paths: unless the differences are indepen- and evaluated it on a set of real-world ciphers with 14,455 lines of dent of the sensitive data, they may be exploited by an adversary. C code in total. Our experiments demonstrate both the efficiency Cache-induced leaks are caused by differences in the number of of our method and its effectiveness in detecting side-channel leaks. cache hits and misses along different paths. Existing methods for detecting timing leaks or proving their CCS CONCEPTS absence often ignore the cache all together while focusing on · Security and privacy → Cryptanalysis and other attacks; instruction-induced leaks. For example, Chen et al. [23] used Carte- · Software and its engineering → Software verification and sian Hoare Logic [58] to prove the timing leak of a program is validation; within a bound; Antonopoulos et al. [8] used a similar technique that partitions the set of program paths in a way that, if individual KEYWORDS partitions are proved to be timing attack resilient, the entire pro- Side-channel attack, concurrency, cache, timing, symbolic execution gram is also timing attack resilient. Unfortunately, these methods ignore the cache-timing characteristics. Even for techniques that ACM Reference Format: consider the cache [12, 21, 25, 30, 46, 61], their focus has been on Shengjian Guo, Meng Wu, and Chao Wang. 2018. Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks. In Pro- leaks manifested by the program itself when running alone, without ceedings of the 26th ACM Joint European Software Engineering Conference considering the cases when it is executed concurrently with some and Symposium on the Foundations of Software Engineering (ESEC/FSE ’18), other (benign or adversarial) threads. November 4ś9, 2018, Lake Buena Vista, FL, USA. ACM, New York, NY, USA, In this work, we show side-channel leak-freedom, as a security 12 pages. https://doi.org/10.1145/3236024.3236028 property, is not compositional. That is, a leak-free program when running alone may still be leaky when it is interleaved with other 1 INTRODUCTION threads, provided that they share the memory subsystem. This is Side-channel attacks are security attacks where an adversary ex- the case even if all paths in the program have the same number ploits the dependency between sensitive data and non-functional and type of instructions and thus do not have instruction-induced properties of a program such as the execution time [28, 43], power timing leaks at all. Unfortunately, no existing method or tool is consumption [44, 51], heat, sound [37], and electromagnetic radia- capable of detecting such timing leaks. tion [36, 57]. For timing side channels, in particular, there are two We propose a new method, named adversarial symbolic execu- main sources of leaks: variances in the number of executed instruc- tion, to detect such concurrency-related timing leaks. Specifically, tions and variances in the cache behavior. Instruction-induced leaks given a program where one thread conducts a security-critical com- putation, e.g., by calling functions in a cryptographic library, and Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed another thread is (either accidentally or intentionally) adversarial, for profit or commercial advantage and that copies bear this notice and the full citation our method systematically explores both paths in these threads and on the first page. Copyrights for components of this work owned by others than ACM their interleavings. The exploration is symbolic in that it covers must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a feasible paths under all input values. During the symbolic execu- fee. Request permissions from [email protected]. tion, we aim to analyze the cache behavior related to sensitive data ESEC/FSE ’18, November 4ś9, 2018, Lake Buena Vista, FL, USA to detect timing leaks caused by the interleaving. © 2018 Association for Computing Machinery. SymSC ACM ISBN 978-1-4503-5573-5/18/11...$15.00 Figure 1 shows the flow of our leak detector named , which ′ https://doi.org/10.1145/3236024.3236028 takes the victim thread P, a potentially adversarial thread P , and ESEC/FSE ’18, November 4–9, 2018, Lake Buena Vista, FL, USA Shengjian Guo, Meng Wu, and Chao Wang the cache configuration as input. If P ′ is not given, SymSC creates SymSC /* k is sensitive input */ /* k is sensitive input */ it automatically. While symbolically executing the program, 1: char p[256]; 1: char p[256]; explores all thread paths and searches for an adversarial interleaving 2: unsigned char k; 2: unsigned char k; 3: char q[256]; 3: char q[256]; of these paths that exposes divergent cache behaviors in P. There 4: 4: are two main technical challenges. The first one is associated with 5: load reg1, p[k] 5: if (k <= 127) 6: if (k <= 127) 6: load reg2, q[255-k] systematic exploration of the interleaved executions of a concurrent 7: load reg2, q[255-k] 7: else program so as not to miss any adversarial interleaving. The second 8: else 8: load reg2, q[k-128] 9: load reg2, q[k-128] 9: load reg1, p[k] one is associated with modeling the cache accurately while reducing 10: add reg1, reg2 10: add reg1, reg2 the computational cost. 11: store reg1, p[k] 11: store reg1, p[k] To address the first challenge, we developed a new algorithm for ----------------------------- ----------------------------- k=0 : <miss, miss, miss> adversarially exploring the interleaved executions while mitigat- 1≤k≤255: <miss, miss, hit> 0≤k≤255: <miss, miss, hit> ing the path and interleaving explosions. Specifically, cache timing (a) The leaky program P (b) The leak-free version Pr behavior constraints, which are constructed on the fly during sym- bolic execution, are leveraged to prune interleavings redundant for Figure 2: A program with cache-timing leak (cf. [22]). detecting leaks and thus speed up the exploration. To address the second challenge, we developed a technique for example used in [22], for which the authors proposed the leak-free modeling the cache behavior of a program based on the cache’s version shown in Figure 2(b). The two programs have the same set type and configuration, as well as optimizations of the subsequent of instructions but differ in where the highlighted load instruction constraint solving to reduce overhead. For each concurrent execu- is located: line 5 in P and line 9 in P . tion (an interleaving of the threads) denoted π = (in,sch), where r Consider executing the two programs under a 512-byte direct- in is the sensitive data input and sch is the interleaving schedule, mapped cache with one byte per cache line, as shown in Figure 3. we construct a logical constraint τ (in,sch) for every potentially t The choice of one-byte-per-cache-line Ð same as in [22] Ð is meant adversarial memory access t, to indicate when it leads to a cache to simplify analysis without loss of generality. Specifically, the hit. Then, we seek two distinct values of the data input, in and in′, 256-byte array p is associated with the first 256 cache lines, while for which the cache behaves differently: τ (in,sch) , τ (in′,sch), t t variable k is associated with the 257-th cache line. Due to the finite meaning one of them is a hit but the other is a miss, and they are cache size, q[255] has to share the cache line with p[0]. due to differences in the sensitive data input. There are two program paths in P, each with three memory We have implemented our method in a software tool based on accesses: load (line 5), load (line 7 or line 9), and store (line 11). LLVM and the KLEE symbolic virtual machine [20], and evaluated However, depending on the value of k, these three memory accesses it on twenty benchmark programs. These security-critical programs may exhibit different cache behaviors, thus causing data-dependent are ciphers taken from cryptographic libraries in the public domain; timing variance.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us