Extracting the Secrets of OpenSSL with RAMBleed

Concomitant with the increasing density of semiconductors, various attacks that threaten the integrity and security of dynamic random access memory (DRAM) have been devised. Among these, a side-channel attack called RAMBleed is a prolific one that utilizes a general user-level account without specia...

Full description

Bibliographic Details
Main Authors: Chihiro Tomita, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, Masakatu Morii
Format: Article
Language:English
Published: MDPI AG 2022-05-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/9/3586
_version_ 1797502691258138624
author Chihiro Tomita
Makoto Takita
Kazuhide Fukushima
Yuto Nakano
Yoshiaki Shiraishi
Masakatu Morii
author_facet Chihiro Tomita
Makoto Takita
Kazuhide Fukushima
Yuto Nakano
Yoshiaki Shiraishi
Masakatu Morii
author_sort Chihiro Tomita
collection DOAJ
description Concomitant with the increasing density of semiconductors, various attacks that threaten the integrity and security of dynamic random access memory (DRAM) have been devised. Among these, a side-channel attack called RAMBleed is a prolific one that utilizes a general user-level account without special rights to read secret information. Studies have reported that it can be used to obtain OpenSSH secret keys. However, a technique for deriving the Rivest–Shamir–Adleman (RSA) secret keys used in OpenSSL under realistic parameters and environments has not been reported. We propose a method that uses RAMBleed to obtain OpenSSL secret keys and demonstrate its efficacy using the example of an Apache server. The proposed method exploits the fact that, in the operation of an Apache server that uses OpenSSL, the RSA private keys are deployed on DRAM at a set time. Although the result of reading this secret information contains a few errors, error-free secret information is obtainable when it is used with RSA cryptanalysis techniques. We performed a series of attacks incorporating RAMBleed and eventually retrieved the OpenSSL RSA private key, indicating that secret information is obtainable with high probability. The proposed method can easily and externally be executed without administrator privileges on a server using DRAM that is vulnerable to RAMBleed, showing that RAMBleed is also a major threat to OpenSSL.
first_indexed 2024-03-10T03:39:41Z
format Article
id doaj.art-073fc9d866ab4c33a095dbd64b686cf6
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T03:39:41Z
publishDate 2022-05-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-073fc9d866ab4c33a095dbd64b686cf62023-11-23T09:20:38ZengMDPI AGSensors1424-82202022-05-01229358610.3390/s22093586Extracting the Secrets of OpenSSL with RAMBleedChihiro Tomita0Makoto Takita1Kazuhide Fukushima2Yuto Nakano3Yoshiaki Shiraishi4Masakatu Morii5Graduate School of Engineering, Kobe University, Kobe 657-8501, JapanGraduate School of Information Science, University of Hyogo, Kobe 651-2197, JapanInformation Security Laboratory, KDDI Research, Inc., Saitama 356-8502, JapanInformation Security Laboratory, KDDI Research, Inc., Saitama 356-8502, JapanGraduate School of Engineering, Kobe University, Kobe 657-8501, JapanGraduate School of Engineering, Kobe University, Kobe 657-8501, JapanConcomitant with the increasing density of semiconductors, various attacks that threaten the integrity and security of dynamic random access memory (DRAM) have been devised. Among these, a side-channel attack called RAMBleed is a prolific one that utilizes a general user-level account without special rights to read secret information. Studies have reported that it can be used to obtain OpenSSH secret keys. However, a technique for deriving the Rivest–Shamir–Adleman (RSA) secret keys used in OpenSSL under realistic parameters and environments has not been reported. We propose a method that uses RAMBleed to obtain OpenSSL secret keys and demonstrate its efficacy using the example of an Apache server. The proposed method exploits the fact that, in the operation of an Apache server that uses OpenSSL, the RSA private keys are deployed on DRAM at a set time. Although the result of reading this secret information contains a few errors, error-free secret information is obtainable when it is used with RSA cryptanalysis techniques. We performed a series of attacks incorporating RAMBleed and eventually retrieved the OpenSSL RSA private key, indicating that secret information is obtainable with high probability. The proposed method can easily and externally be executed without administrator privileges on a server using DRAM that is vulnerable to RAMBleed, showing that RAMBleed is also a major threat to OpenSSL.https://www.mdpi.com/1424-8220/22/9/3586rowhammerRAMBleedOpenSSLside-channel attackkey recovery attackRSA
spellingShingle Chihiro Tomita
Makoto Takita
Kazuhide Fukushima
Yuto Nakano
Yoshiaki Shiraishi
Masakatu Morii
Extracting the Secrets of OpenSSL with RAMBleed
Sensors
rowhammer
RAMBleed
OpenSSL
side-channel attack
key recovery attack
RSA
title Extracting the Secrets of OpenSSL with RAMBleed
title_full Extracting the Secrets of OpenSSL with RAMBleed
title_fullStr Extracting the Secrets of OpenSSL with RAMBleed
title_full_unstemmed Extracting the Secrets of OpenSSL with RAMBleed
title_short Extracting the Secrets of OpenSSL with RAMBleed
title_sort extracting the secrets of openssl with rambleed
topic rowhammer
RAMBleed
OpenSSL
side-channel attack
key recovery attack
RSA
url https://www.mdpi.com/1424-8220/22/9/3586
work_keys_str_mv AT chihirotomita extractingthesecretsofopensslwithrambleed
AT makototakita extractingthesecretsofopensslwithrambleed
AT kazuhidefukushima extractingthesecretsofopensslwithrambleed
AT yutonakano extractingthesecretsofopensslwithrambleed
AT yoshiakishiraishi extractingthesecretsofopensslwithrambleed
AT masakatumorii extractingthesecretsofopensslwithrambleed