Impact of flush+reload cache side-channel attack on the cps environment and detection technique of flush+reload cache side-channel attack

被引:0
|
作者
Park H. [1 ]
Lee S. [1 ]
Lee S. [1 ]
Kim D. [1 ]
机构
[1] Department of Information and Communication Engineering, DGIST
关键词
Attack detection; Cache side-channel attack; CPS; Flush+reload;
D O I
10.5302/J.ICROS.2021.20.0176
中图分类号
学科分类号
摘要
The security of computer systems is highly critical in CPS (Cyber-Physical Systems) as the use of physical systems controlled by compromised computing systems poses a threat to the users. In this paper, we first describe a security attack that exploits the weaknesses of computer hardware, known as the cache-side channel attack, and discuss the impact of the attack on the CPS environment. Next, we propose a two-stage attack detection technique that can dynamically detect the cache-side attack based on flush+reload by using hardware performance counters while supporting online monitoring. The experimental results demonstrate that our proposed technique can detect the attacker processes effectively with zero failure rates when co-operating with certain applications. © ICROS 2021.
引用
收藏
页码:98 / 104
页数:6
相关论文
共 50 条
  • [21] PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring
    Wu, Minjun
    McCamant, Stephen
    Yew, Pen-Chung
    Zhai, Antonia
    2022 IEEE INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2022), 2022, : 25 - 36
  • [22] A Novel Approach to Prevent Cache-Based Side-Channel Attack in the Cloud
    Sadique, Muhammed U. K.
    James, Divya
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 232 - 239
  • [23] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [24] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [25] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Zhou, Ping
    Wang, Tao
    Lou, Xiaoxuan
    Zhao, Xinjie
    Zhang, Fan
    Guo, Shize
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [26] Efficient RNIC Cache Side-Channel Attack Detection Through DPU-Driven Architecture
    Liao, Yunkun
    Wu, Jingya
    Lu, Wenyan
    Li, Xiaowei
    Yan, Guihai
    EURO-PAR 2024: PARALLEL PROCESSING, PART II, EURO-PAR 2024, 2024, 14802 : 3 - 17
  • [27] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Ping Zhou
    Tao Wang
    Xiaoxuan Lou
    Xinjie Zhao
    Fan Zhang
    Shize Guo
    Science China Information Sciences, 2018, 61
  • [28] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Ping ZHOU
    Tao WANG
    Xiaoxuan LOU
    Xinjie ZHAO
    Fan ZHANG
    Shize GUO
    ScienceChina(InformationSciences), 2018, 61 (03) : 234 - 236
  • [29] Flush-Reload Attack and its Mitigation on an FPGA Based Compressed Cache Design
    Mata, Prashant
    Rao, Nanditha
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 535 - 541
  • [30] Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Lange, Tanja
    Yarom, Yuval
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 323 - 345