Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)

06/07/2023
by   Adi Kafuman, et al.
0

Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such read access controls via timing attacks on the key-value store, which use differences in query response times to glean information about stored data. To date, key-value store timing attacks have aimed to disclose stored values and have exploited external mechanisms that can be disabled for protection. In this paper, we point out that key disclosure is also a security threat – and demonstrate key disclosure timing attacks that exploit mechanisms of the key-value store itself. We target LSM-tree based key-value stores utilizing range filters, which have been recently proposed to optimize LSM-tree range queries. We analyze the impact of the range filters SuRF and prefix Bloom filter on LSM-trees through a security lens, and show that they enable a key disclosure timing attack, which we call prefix siphoning. Prefix siphoning successfully leverages benign queries for non-present keys to identify prefixes of actual keys – and in some cases, full keys – in scenarios where brute force searching for keys (via exhaustive enumeration or random guesses) is infeasible.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/10/2017

Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures

Time variation during program execution can leak sensitive information. ...
research
03/01/2021

On the Cost of Unsuccessful Searches in Search Trees with Two-way Comparisons

Search trees are commonly used to implement access operations to a set o...
research
06/07/2023

Reversible Numeric Composite Key (RNCK)

In database design, Composite Keys are used to uniquely identify records...
research
09/04/2020

Access-Adaptive Priority Search Tree

In this paper we show that the priority search tree of McCreight, which ...
research
04/10/2019

KEY-SSD: Access-Control Drive to Protect Files from Ransomware Attacks

Traditional techniques to prevent damage from ransomware attacks are to ...
research
12/01/2016

When to Reset Your Keys: Optimal Timing of Security Updates via Learning

Cybersecurity is increasingly threatened by advanced and persistent atta...
research
06/09/2020

Dynamic Interleaving of Content and Structure for Robust Indexing of Semi-Structured Hierarchical Data (Extended Version)

We propose a robust index for semi-structured hierarchical data that sup...

Please sign up or login with your details

Forgot password? Click here to reset