Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Pythia: Remote Oracles for the Masses
 
conference paper

Pythia: Remote Oracles for the Masses

Tsai, Shin-Yeh
•
Payer, Mathias  
•
Zhang, Yiying
January 1, 2019
Proceedings Of The 28Th Usenix Security Symposium
28th USENIX Security Symposium

Remote Direct Memory Access (RDMA) is a technology that allows direct access from the network to a machine's main memory without involving its CPU. RDMA offers low-latency, high-bandwidth performance and low CPU utilization. While RDMA provides massive performance boosts and has thus been adopted by several major cloud providers, security concerns have so far been neglected.

The need for RDMA NICs to bypass CPU and directly access memory results in them storing various metadata like page table entries in their on-board SRAM. When the SRAM is full, RNICs swap metadata to main memory across the PCIe bus. We exploit the resulting timing difference to establish side channels and demonstrate that these side channels can leak access patterns of victim nodes to other nodes.

We design Pythia, a set of RDMA-based remote side-channel attacks that allow an attacker on one client machine to learn how victims on other client machines access data a server exports as an in-memory data service. We reverse engineer the memory architecture of the most widely used RDMA NIC and use this knowledge to improve the efficiency of Pythia. We further extend Pythia to build side-channel attacks on Crail, a real RDMA-based key-value store application. We evaluated Pythia on four different RDMA NICs both in a laboratory and in a public cloud setting. Pythia is fast (57 mu s), accurate (97% accuracy), and can hide all its traces from the victim or the server.

  • Details
  • Metrics
Type
conference paper
Web of Science ID

WOS:000509775000040

Author(s)
Tsai, Shin-Yeh
Payer, Mathias  
Zhang, Yiying
Date Issued

2019-01-01

Publisher

USENIX ASSOC

Publisher place

Berkeley

Published in
Proceedings Of The 28Th Usenix Security Symposium
ISBN of the book

978-1-939133-06-9

Start page

693

End page

710

Subjects

time

•

end

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent placeEvent date
28th USENIX Security Symposium

Santa Clara, CA

Aug 14-16, 2019

Available on Infoscience
February 20, 2020
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/166386
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés