Impact of flush+reload cache side-channel attack on the cps environment and detection technique of flush+reload cache side-channel attack

被引:0
|
作者
Park H. [1 ]
Lee S. [1 ]
Lee S. [1 ]
Kim D. [1 ]
机构
[1] Department of Information and Communication Engineering, DGIST
关键词
Attack detection; Cache side-channel attack; CPS; Flush+reload;
D O I
10.5302/J.ICROS.2021.20.0176
中图分类号
学科分类号
摘要
The security of computer systems is highly critical in CPS (Cyber-Physical Systems) as the use of physical systems controlled by compromised computing systems poses a threat to the users. In this paper, we first describe a security attack that exploits the weaknesses of computer hardware, known as the cache-side channel attack, and discuss the impact of the attack on the CPS environment. Next, we propose a two-stage attack detection technique that can dynamically detect the cache-side attack based on flush+reload by using hardware performance counters while supporting online monitoring. The experimental results demonstrate that our proposed technique can detect the attacker processes effectively with zero failure rates when co-operating with certain applications. © ICROS 2021.
引用
收藏
页码:98 / 104
页数:6
相关论文
共 50 条
  • [31] Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries
    Wang, Daimeng
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    Krishnamurthy, Srikanth, V
    Colbert, Edward J. M.
    Yu, Paul
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [32] Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks
    Wang, Han
    Hafiz, Syed Mahbub
    Patwari, Kartik
    Chuah, Chen-Nee
    Shafiq, Zubair
    Homayoun, Houman
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 1515 - 1520
  • [33] Development of Side-Channel Attack Standard Evaluation Environment
    Katashita, Toshihiro
    Satoh, Akashi
    Sugawara, Takeshi
    Homma, Naofumi
    Aoki, Takafumi
    2009 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1 AND 2, 2009, : 403 - +
  • [34] Side-channel attack on substitution blocks
    Novak, R
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318
  • [35] SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
    Javier Hernandez-Castro, Carlos
    Ribagorda, Arturo
    Saez, Yago
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 59 - 65
  • [36] Symbolic Verification of Cache Side-Channel Freedom
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (11) : 2812 - 2823
  • [37] USB side-channel attack on Tor
    Yang, Qing
    Gasti, Paolo
    Balagani, Kiran
    Li, Yantao
    Zhou, Gang
    COMPUTER NETWORKS, 2018, 141 : 57 - 66
  • [38] Analysis on the Parameter Selection Method for FLUSH plus RELOAD Based Cache Timing Attack on RSA
    Zhou Ping
    Wang Tao
    Li Guang
    Zhang Fan
    Zhao Xinjie
    CHINA COMMUNICATIONS, 2015, 12 (06) : 33 - 45
  • [39] SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison
    Wang, Limin
    Bui, Lei
    Song, Fu
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [40] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146