Authors
Yinqian Zhang, Ari Juels, Michael K Reiter, Thomas Ristenpart
Publication date
2014/11/3
Book
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Pages
990-1003
Description
We present a new attack framework for conducting cache-based side-channel attacks and demonstrate this framework in attacks between tenants on commercial Platform-as-a-Service (PaaS) clouds. Our framework uses the FLUSH-RELOAD attack of Gullasch et al. as a primitive, and extends this work by leveraging it within an automaton-driven strategy for tracing a victim's execution. We leverage our framework first to confirm co-location of tenants and then to extract secrets across tenant boundaries. We specifically demonstrate attacks to collect potentially sensitive application data (e.g., the number of items in a shopping cart), to hijack user accounts, and to break SAML single sign-on. To the best of our knowledge, our attacks are the first granular, cross-tenant, side-channel attacks successfully demonstrated on state-of-the-art commercial clouds, PaaS or otherwise.
Total citations
20152016201720182019202020212022202320243246645970646347365
Scholar articles
Y Zhang, A Juels, MK Reiter, T Ristenpart - Proceedings of the 2014 ACM SIGSAC Conference on …, 2014