Impact of flush+reload cache side-channel attack on the cps environment and detection technique of flush+reload cache side-channel attack

被引:0
|
作者
Park H. [1 ]
Lee S. [1 ]
Lee S. [1 ]
Kim D. [1 ]
机构
[1] Department of Information and Communication Engineering, DGIST
关键词
Attack detection; Cache side-channel attack; CPS; Flush+reload;
D O I
10.5302/J.ICROS.2021.20.0176
中图分类号
学科分类号
摘要
The security of computer systems is highly critical in CPS (Cyber-Physical Systems) as the use of physical systems controlled by compromised computing systems poses a threat to the users. In this paper, we first describe a security attack that exploits the weaknesses of computer hardware, known as the cache-side channel attack, and discuss the impact of the attack on the CPS environment. Next, we propose a two-stage attack detection technique that can dynamically detect the cache-side attack based on flush+reload by using hardware performance counters while supporting online monitoring. The experimental results demonstrate that our proposed technique can detect the attacker processes effectively with zero failure rates when co-operating with certain applications. © ICROS 2021.
引用
收藏
页码:98 / 104
页数:6
相关论文
共 50 条
  • [1] Enhanced Flush+Reload Attack on AES
    Seddigh, Milad
    Soleimany, Hadi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 81 - 89
  • [2] Defeating Hardware Prefetchers in Flush plus Reload Side-Channel Attack
    Wang, Zihao
    Peng, Shuanghe
    Jiang, Wenbin
    Guo, Xinyue
    IEEE ACCESS, 2021, 9 : 21251 - 21257
  • [3] FLUSH plus RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
    Yarom, Yuval
    Falkner, Katrina
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 719 - 732
  • [4] CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds
    Zhang, Weijuan
    Jia, Xiaoqi
    Tai, Jianwei
    Wang, Mingsheng
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 665 - 677
  • [5] Analysis on the Parameter Selection Method for FLUSH+RELOAD Based Cache Timing Attack on RSA
    ZHOU Ping
    WANG Tao
    LI Guang
    ZHANG Fan
    ZHAO Xinjie
    中国通信, 2015, 12 (06) : 33 - 45
  • [6] 基于Flush+Reload的DES算法Cache计时攻击
    程志炜
    陈财森
    邱雪欢
    计算机工程, 2018, 44 (12) : 163 - 167
  • [7] Cache Side-Channel Attacks: Flush plus Flush and the Countermeasures Time Gap
    Bhebe, Keith Nyasha
    Liu, Jian
    Qu, Wenyu
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 880 - 887
  • [8] Attack of the Knights: A Non Uniform Cache Side-Channel Attack
    Mahmud, Farabi
    Kim, Sungkeun
    Chawla, Harpreet Singh
    Kim, E. J.
    Tsai, Chia-Che
    Muzahid, Abdullah
    39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 691 - 703
  • [9] Cache Side-Channel Attack on Mail User Agent
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 236 - 238
  • [10] MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
    Wan, Junpeng
    Bi, Yanxiang
    Zhou, Zhe
    Li, Zhou
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1506 - 1524