• DocumentCode
    724642
  • Title

    Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems

  • Author

    Yuanzhong Xu ; Weidong Cui ; Peinado, Marcus

  • Author_Institution
    Univ. of Texas at Austin, Austin, TX, USA
  • fYear
    2015
  • fDate
    17-21 May 2015
  • Firstpage
    640
  • Lastpage
    656
  • Abstract
    The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long line of work on excluding these operating systems from the trusted computing base of applications, while retaining many of their benefits. Legacy applications continue to run on the untrusted operating system, while a small hyper visor or trusted hardware prevents the operating system from accessing the applications´ memory. In this paper, we introduce controlled-channel attacks, a new type of side-channel attack that allows an untrusted operating system to extract large amounts of sensitive information from protected applications on systems like Overshadow, Ink Tag or Haven. We implement the attacks on Haven and Ink Tag and demonstrate their power by extracting complete text documents and outlines of JPEG images from widely deployed application libraries. Given these attacks, it is unclear if Over shadow´s vision of protecting unmodified legacy applications from legacy operating systems running on off-the-shelf hardware is still tenable.
  • Keywords
    cryptography; document handling; operating systems (computers); trusted computing; Haven; Ink Tag; JPEG images; Overshadow; controlled-channel attacks; deterministic side channels; feature-rich commodity operating systems; hypervisor; legacy operating systems; security vulnerabilities; text documents; trusted computing; trusted hardware; untrusted operating systems; Control systems; Data mining; Hardware; Monitoring; Operating systems; Resource management; Virtual machine monitors; SGX; side-channel attack; untrusted operating system; virtualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy (SP), 2015 IEEE Symposium on
  • Conference_Location
    San Jose, CA
  • ISSN
    1081-6011
  • Type

    conf

  • DOI
    10.1109/SP.2015.45
  • Filename
    7163052