72
Memento Learning Secrets from Process Footprints [3] Suman Jana Vitaly Shmatikov CAP6135 Malware & Software Vulnerability Analysis Sidhanth Sheelavanth 1 under Prof. Cliff Zou 1 1 University of Central Florida Dept. of EECS April 16, 2014

Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

MementoLearning Secrets from Process Footprints[3]

Suman Jana Vitaly Shmatikov

CAP6135 Malware & Software Vulnerability Analysis

Sidhanth Sheelavanth1

underProf. Cliff Zou1

1University of Central FloridaDept. of EECS

April 16, 2014

Page 2: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

7.4 %

About Paper

Authors - Suman Jana , Vitaly Shmatikov. UT - Austin.

IEEE Symposium on Security and Privacy 2012.

Best Student Paper Award.

Partly funded by NSF grants.

Demo - side channel attack.

Page 3: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 4: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 5: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 6: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 7: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 8: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 9: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 10: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 11: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 12: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

11.1 %

Outline

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 13: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

14.8 %

Outline

1 Introduction.2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 14: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

18.5 %

Introduction

Memento[1] -

Page 15: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

22.2 %

IntroductionTerminology

Side Channel Attack.

[P] Timing(CPU, mem), Power Analysis(SPA,DPA),Acoustic Cryptanalysis , Differential Fault, DataRemanence.[2]

Secrets - Webpage Identity, Finer grained information.

Process Footprint - DRS/WS/RSS.

[P]

Page 16: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

22.2 %

IntroductionTerminology

Side Channel Attack.

[P] Timing(CPU, mem), Power Analysis(SPA,DPA),Acoustic Cryptanalysis , Differential Fault, DataRemanence.[2]

Secrets - Webpage Identity, Finer grained information.

Process Footprint - DRS/WS/RSS.

[P]

Page 17: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

22.2 %

IntroductionTerminology

Side Channel Attack.

[P] Timing(CPU, mem), Power Analysis(SPA,DPA),Acoustic Cryptanalysis , Differential Fault, DataRemanence.[2]

Secrets - Webpage Identity, Finer grained information.

Process Footprint - DRS/WS/RSS.

[P]

Page 18: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

22.2 %

IntroductionTerminology

Side Channel Attack.

[P] Timing(CPU, mem), Power Analysis(SPA,DPA),Acoustic Cryptanalysis , Differential Fault, DataRemanence.[2]

Secrets - Webpage Identity, Finer grained information.

Process Footprint - DRS/WS/RSS.

[P]

Page 19: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

25.9 %

OutlineYAAAAWN !!!

1 Introduction.2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 20: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 21: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 22: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 23: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 24: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 25: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 26: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

29.6 %

Why Do It ?

Symptom of larger problem. Illusion of harmlessness(System isolation mechanisms).

OS mechanisms increasingly leveraged.

Android, Network Daemons,Chrome, IE.

Related Work. Fails with non-deterministic programs (ESPnot required).

Zhang,Wang[4] . /proc ↔ ESP. Keystroke sniffingDawn Song [5] . Timing analysis on SSH.

Different Attack model. Network Attacker vs LocalAttacker.

Page 27: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

33.3 %

OutlineMUST.. KEEP .. EYes .. op..zzz..

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 28: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

37 %

Attack Overview

2 Processes in parallel on same host as different users.

1 Run concurrently .2 Measure target’s memory footprint (memprint) periodically.3 Build Signature Database D .4 Perform Attack .

Page 29: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

37 %

Attack Overview

2 Processes in parallel on same host as different users.

1 Run concurrently .2 Measure target’s memory footprint (memprint) periodically.3 Build Signature Database D .4 Perform Attack .

Page 30: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

37 %

Attack Overview

2 Processes in parallel on same host as different users.

1 Run concurrently .2 Measure target’s memory footprint (memprint) periodically.3 Build Signature Database D .4 Perform Attack .

Page 31: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

37 %

Attack Overview

2 Processes in parallel on same host as different users.

1 Run concurrently .2 Measure target’s memory footprint (memprint) periodically.3 Build Signature Database D .4 Perform Attack .

Page 32: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

37 %

Attack Overview

2 Processes in parallel on same host as different users.

1 Run concurrently .2 Measure target’s memory footprint (memprint) periodically.3 Build Signature Database D .4 Perform Attack .

Page 33: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

37 %

Attack Overview

2 Processes in parallel on same host as different users.

1 Run concurrently .2 Measure target’s memory footprint (memprint) periodically.3 Build Signature Database D .4 Perform Attack .

Page 34: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

40.7 %

Outlinelife, the universe and everything ? 42 .

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 35: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

44.4 %

Attack DetailsBrowser Mem Management

Different browsers,different allocators(jemalloc,tcmalloc,etc ... ).

Allocator optimization & behaviour , Sensitivity.Not directly translated,Varies, Memprint, Noise.

Page 36: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

48.1 %

Attack DetailsWhen it works ?

Diversity.

Stability.

Which process to monitor?

Monolithic browsers.Micro Kernel browsers.

Network attacks.

Page 37: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

51.9 %

Outlineprogress bar at the top says 50%. YES!!

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 38: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

55.6 %

Experimental Setup

Browsers - Chrome,Firefox,Android

OS - Windows,Linux,Android.

Memory Signature gathering by automated scripts.

ALEXA top 100,000 websites.

Memprint statistics collected.

DRS change recorded using PID.Scaled to 100,000 webpages , attacker pauses victim .FixSched, Attack.

Plugins,addons,extensions alter in predictable ways.Offsetcalculated or blocker used.

Page 39: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

55.6 %

Experimental Setup

Browsers - Chrome,Firefox,Android

OS - Windows,Linux,Android.

Memory Signature gathering by automated scripts.

ALEXA top 100,000 websites.

Memprint statistics collected.

DRS change recorded using PID.Scaled to 100,000 webpages , attacker pauses victim .FixSched, Attack.

Plugins,addons,extensions alter in predictable ways.Offsetcalculated or blocker used.

Page 40: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

55.6 %

Experimental Setup

Browsers - Chrome,Firefox,Android

OS - Windows,Linux,Android.

Memory Signature gathering by automated scripts.

ALEXA top 100,000 websites.

Memprint statistics collected.

DRS change recorded using PID.Scaled to 100,000 webpages , attacker pauses victim .FixSched, Attack.

Plugins,addons,extensions alter in predictable ways.Offsetcalculated or blocker used.

Page 41: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

55.6 %

Experimental Setup

Browsers - Chrome,Firefox,Android

OS - Windows,Linux,Android.

Memory Signature gathering by automated scripts.

ALEXA top 100,000 websites.

Memprint statistics collected.

DRS change recorded using PID.Scaled to 100,000 webpages , attacker pauses victim .FixSched, Attack.

Plugins,addons,extensions alter in predictable ways.Offsetcalculated or blocker used.

Page 42: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

55.6 %

Experimental Setup

Browsers - Chrome,Firefox,Android

OS - Windows,Linux,Android.

Memory Signature gathering by automated scripts.

ALEXA top 100,000 websites.

Memprint statistics collected.

DRS change recorded using PID.Scaled to 100,000 webpages , attacker pauses victim .FixSched, Attack.

Plugins,addons,extensions alter in predictable ways.Offsetcalculated or blocker used.

Page 43: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

59.3 %

Outlinemaybe if I start clapping early .. hel stop ?

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 44: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

63 %

ResultsVerification

False + , False -.

Distinguishability .

wrt fixed ambiguity sets.distinguishability = (µ− σ)− (µfalse + σfalse)positive or negative ? Statistics

Recognizability

true positive rate.Not every page produces a match.Fixsched and Attack visited 5-15 times.Threshhold = highestJ(sigp,memprint(visittoambiguitypage)).

Statistics

Factors affecting accuracy ofmeasurement.(method,concurrent workload,measurementrate,variations).

Page 45: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

63 %

ResultsVerification

False + , False -.

Distinguishability .

wrt fixed ambiguity sets.distinguishability = (µ− σ)− (µfalse + σfalse)positive or negative ? Statistics

Recognizability

true positive rate.Not every page produces a match.Fixsched and Attack visited 5-15 times.Threshhold = highestJ(sigp,memprint(visittoambiguitypage)).

Statistics

Factors affecting accuracy ofmeasurement.(method,concurrent workload,measurementrate,variations).

Page 46: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

63 %

ResultsVerification

False + , False -.

Distinguishability .

wrt fixed ambiguity sets.distinguishability = (µ− σ)− (µfalse + σfalse)positive or negative ? Statistics

Recognizability

true positive rate.Not every page produces a match.Fixsched and Attack visited 5-15 times.Threshhold = highestJ(sigp,memprint(visittoambiguitypage)).

Statistics

Factors affecting accuracy ofmeasurement.(method,concurrent workload,measurementrate,variations).

Page 47: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

63 %

ResultsVerification

False + , False -.

Distinguishability .

wrt fixed ambiguity sets.distinguishability = (µ− σ)− (µfalse + σfalse)positive or negative ? Statistics

Recognizability

true positive rate.Not every page produces a match.Fixsched and Attack visited 5-15 times.Threshhold = highestJ(sigp,memprint(visittoambiguitypage)).

Statistics

Factors affecting accuracy ofmeasurement.(method,concurrent workload,measurementrate,variations).

Page 48: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

66.7 %

Outlinewonder if I have anterograde amnesia ?...

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 49: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

70.4 %

Extensions of AttackAdvanced Attacks

Variations.

Web Sessions.

Similar memprintdisambiguation.

[3]Fig.19, 23

Page 50: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

74.1 %

Extensions of AttackCPU Scheduling Stats

ESP, keystroke timingrelation.[4]

top− ltm1,contextswitches,schedstat,Android,LIME.

Use this to differentiate.

[3]Fig.5, TableV

Page 51: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

77.8 %

Outlinehmm. 8 ’s my new fav number.

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 52: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

81.5 %

Defenses

Changing the OS.

Not a OS specific attack.Can be calculated.Designers must cooperate.

Changing the application.

Browser defenses (network,proxy,incognito etc ...) dontwork.Reduce app↔OS correlation.Kernel hardening patches.Memory usage abstraction.monolithic browsers.

Page 53: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

81.5 %

Defenses

Changing the OS.

Not a OS specific attack.Can be calculated.Designers must cooperate.

Changing the application.

Browser defenses (network,proxy,incognito etc ...) dontwork.Reduce app↔OS correlation.Kernel hardening patches.Memory usage abstraction.monolithic browsers.

Page 54: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

85.2 %

Outlinenope. It’s 9...

1 Introduction2 Why Do it ?3 Attack Overview.4 Attack Details.

Browser Mem Management.When it works ?

5 Experimental Setup.6 Results.7 Extensions of Attack.

Advanced Attacks.CPU Scheduling Stats.

8 Defenses.9 Presenter’s Notes.

Pros.Cons.

10 Appendix.

Page 55: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

88.9 %

[P]Presenter’s NotesPros

Novel side-channel at-tack.(Elaborate,complete).

Proved Hypothesis.

Structured,well writtenand precise.

Page 56: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

92.6 %

[P]Presenter’s NotesCons

Elaborate attack, result is identity.

Complexity.

Space - O(nmw) .Time - O(n2) .

Solutions not concrete.

Asynchronous CPUs.blinding.

Combination with other side-channel attacks.

Network attacks don’t work.

Page 57: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

92.6 %

[P]Presenter’s NotesCons

Elaborate attack, result is identity.

Complexity.

Space - O(nmw) .Time - O(n2) .

Solutions not concrete.

Asynchronous CPUs.blinding.

Combination with other side-channel attacks.

Network attacks don’t work.

Page 58: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

92.6 %

[P]Presenter’s NotesCons

Elaborate attack, result is identity.

Complexity.

Space - O(nmw) .Time - O(n2) .

Solutions not concrete.

Asynchronous CPUs.blinding.

Combination with other side-channel attacks.

Network attacks don’t work.

Page 59: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

92.6 %

[P]Presenter’s NotesCons

Elaborate attack, result is identity.

Complexity.

Space - O(nmw) .Time - O(n2) .

Solutions not concrete.

Asynchronous CPUs.blinding.

Combination with other side-channel attacks.

Network attacks don’t work.

Page 60: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

92.6 %

[P]Presenter’s NotesCons

Elaborate attack, result is identity.

Complexity.

Space - O(nmw) .Time - O(n2) .

Solutions not concrete.

Asynchronous CPUs.blinding.

Combination with other side-channel attacks.

Network attacks don’t work.

Page 61: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

96.3 %

References

[1] http://www.imdb.com/title/tt0209144/[2] www.wikipedia.com[3] Jana,Suman and Shmatikov,Vitaly, Memento: Learning

Secrets from Process Footprints in IEEE symposium,2012.[4] K. Zhang and X. Wang. Peeping Tom in the neighborhood:

Keystroke eavesdropping on multi-user systems. InUSENIX Security, 2009.

[5] D. Song, D. Wagner, and X. Tian. Timing analysis ofkeystrokes and timing attacks on SSH. In USENIXSecurity, 2001.

Page 62: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

100 %

Don’t forget to watch.

QUESTIONS ?

Page 63: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

16.7 %

Size of Target’s Mem Footprint

Only info needed is mem size.

Most OS’s have no restriction on this.

Different OS

Windows

PDH Library

cmdlets , get-process(wss,host stats)

Linux

DRS field in /proc/<pid>/statm

Data(mmap) + heap(brk) + code(stack)

mm→total vm - shared vm

Android

ps,manifest,kvm getprocs

Overview

Page 64: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

16.7 %

Size of Target’s Mem Footprint

Only info needed is mem size.

Most OS’s have no restriction on this.

Different OS

Windows

PDH Library

cmdlets , get-process(wss,host stats)

Linux

DRS field in /proc/<pid>/statm

Data(mmap) + heap(brk) + code(stack)

mm→total vm - shared vm

Android

ps,manifest,kvm getprocs

Overview

Page 65: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

16.7 %

Size of Target’s Mem Footprint

Only info needed is mem size.

Most OS’s have no restriction on this.

Different OS

Windows

PDH Library

cmdlets , get-process(wss,host stats)

Linux

DRS field in /proc/<pid>/statm

Data(mmap) + heap(brk) + code(stack)

mm→total vm - shared vm

Android

ps,manifest,kvm getprocs

Overview

Page 66: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

33.3 %

Building Signature Database

Create Attack Signatures , Build Database.

Visit w pages n times.Calculate memprint = (E, e) ,E =int footprint size.(DRS,6th field of proc), e =frequency.

Comparison of memprints.

((E, e1)εm1) ∧ ((E, e2)εm2) =⇒ (E,min(e1, e2))εm1 ∩m2

((E, e1)εm1) ∧ ((E, e2)εm2) =⇒ (E,max(e1, e2))εm1 ∪m2

Similarity using jaccard index.J(m1,m2) = |m1∩m2|

|m1∪m2|

Overview

Page 67: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

33.3 %

Building Signature Database

Create Attack Signatures , Build Database.

Visit w pages n times.Calculate memprint = (E, e) ,E =int footprint size.(DRS,6th field of proc), e =frequency.

Comparison of memprints.

((E, e1)εm1) ∧ ((E, e2)εm2) =⇒ (E,min(e1, e2))εm1 ∩m2

((E, e1)εm1) ∧ ((E, e2)εm2) =⇒ (E,max(e1, e2))εm1 ∪m2

Similarity using jaccard index.J(m1,m2) = |m1∩m2|

|m1∪m2|

Overview

Page 68: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

33.3 %

Building Signature Database

Create Attack Signatures , Build Database.

Visit w pages n times.Calculate memprint = (E, e) ,E =int footprint size.(DRS,6th field of proc), e =frequency.

Comparison of memprints.

((E, e1)εm1) ∧ ((E, e2)εm2) =⇒ (E,min(e1, e2))εm1 ∩m2

((E, e1)εm1) ∧ ((E, e2)εm2) =⇒ (E,max(e1, e2))εm1 ∪m2

Similarity using jaccard index.J(m1,m2) = |m1∩m2|

|m1∪m2|

Overview

Page 69: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

50 %

Perform Attack

Attack memprint is matched against signature database.

Overview

Page 70: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

66.7 %

Allocators

Attack Details

Page 71: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

83.3 %

Distinguishability

Verification

Page 72: Memento - Learning Secrets from Process Footprints[3 ...cs.ucf.edu/~czou/CAP6135-14/PaperPresentation/Sidhanth...CPU Scheduling Stats. 8 Defenses. 9 Presenter’s Notes. Pros. Cons

100 %

Recognizability

Verification