MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack

Sowoong Kim, Myeonggyun Han, Woongki Baek

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this work, we conduct in-depth characterization to quantify the impact of DRAM refresh, the location of the target memory object within a non-uniform memory access (NUMA) node, and task and page placement across NUMA nodes and identify a set of the patterns in the clflush latency data. Based on characterization results, we propose MARF, a novel memory-aware clflush-based intra- and inter-CPU side-channel attack on NUMA systems. Our case studies on three real NUMA systems demonstrate that MARF can robustly be used to attack applications that use widely-used cryptographic and user-interface libraries. We also present potential countermeasures against MARF.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, 2023, Proceedings
EditorsGene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis
PublisherSpringer Science and Business Media Deutschland GmbH
Pages120-140
Number of pages21
ISBN (Print)9783031514784
DOIs
StatePublished - 2024
Event28th European Symposium on Research in Computer Security, ESORICS 2023 - The Hague, Netherlands
Duration: 25 Sep 202329 Sep 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14346 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference28th European Symposium on Research in Computer Security, ESORICS 2023
Country/TerritoryNetherlands
CityThe Hague
Period25/09/2329/09/23

Fingerprint

Dive into the research topics of 'MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack'. Together they form a unique fingerprint.

Cite this