The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms

The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms

In this paper we present a new attack technique that allows extraction of selected database content relying merely on the attacker’s ability to perform database transactions (INSERTs or UPDATEs) that are usually available to any anonymous database user. Our attack technique uses a side-channel timing attack in the realm of database indexing algorithms and data structures. We prove that by exploiting the inherent characteristics of the most commonly used indexing data structures and algorithms in today’s commercial database management systems it is possible to extract privacy-sensitive data from a database. In particular we prove, both in theory and practice that it is feasible to do so if the B-tree data structure is used and the attacker is able to insert records with chosen data that is used as the search key of one of the table’s indexes. We present experimental results of a successful attack implementation against MySQL and provide conclusions and ideas for further research.

Related information

Projects

ND2DB Attack

Monday, August 13, 2007