정보보안/커널 보안

Controlled-Channel Attacks Summary

피치 크러쉬 2015. 10. 15. 22:12
300x250

1. Summary
This paper introduces controlled-channel attack.
That allows an untrusted OS to extract large amounts of sensitive information from protected applications on systems like Overshadow, InkTag or Haven.
Authors implement the attacks on Haven and InkTag.
And, Demonstrate their power by extracting complete text documents and outlines of JPEG images from widely deployed application libraries.
through this paper, it is unclear if Overshadow’s vision of protecting unmodified legacy applications from legacy OS running on off-the-shelf hardware is still tenable.

 

2. Related work Summary
Cache side-channel attacks are most closely related to the attacks described in this paper, as both exploit secret-dependent memory accesses by the victim.
Contrary to other works, Attacks in this paper targets a different class of system(shielding systems).
Author speaks that they have different advarsary models, different channels, different challenges and different techniques and more powerful.


3. The Good
Attack is able to extract much richer informations like a full text and images.
It has a full practicality
and This paper give real data to explain possibility


4. The Bad
The attacks are limited to general user programs such as image and text processing.


5. Your Comment
why simple approaches such as self-paging, randomization, and masking timingside-channel briefly conjectured in this paper are insufficient?
There is no detailed information..

반응형