Impact of flush+reload cache side-channel attack on the cps environment and detection technique of flush+reload cache side-channel attack

被引:0
|
作者
Park H. [1 ]
Lee S. [1 ]
Lee S. [1 ]
Kim D. [1 ]
机构
[1] Department of Information and Communication Engineering, DGIST
关键词
Attack detection; Cache side-channel attack; CPS; Flush+reload;
D O I
10.5302/J.ICROS.2021.20.0176
中图分类号
学科分类号
摘要
The security of computer systems is highly critical in CPS (Cyber-Physical Systems) as the use of physical systems controlled by compromised computing systems poses a threat to the users. In this paper, we first describe a security attack that exploits the weaknesses of computer hardware, known as the cache-side channel attack, and discuss the impact of the attack on the CPS environment. Next, we propose a two-stage attack detection technique that can dynamically detect the cache-side attack based on flush+reload by using hardware performance counters while supporting online monitoring. The experimental results demonstrate that our proposed technique can detect the attacker processes effectively with zero failure rates when co-operating with certain applications. © ICROS 2021.
引用
收藏
页码:98 / 104
页数:6
相关论文
共 50 条
  • [41] Flush-reload cache timing attack on SM2 digital signature algorithm
    Zhou, Ping
    Wang, Tao
    Zhang, Fan
    Zhao, Xinjie
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (03): : 24 - 29
  • [42] Cache side-channel attacks detection based on machine learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Wang, Zhanpeng
    Wang, Limin
    Zhang, Yusha
    Liu, Yuxin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 920 - 927
  • [43] FLUSH plus PREFETCH: A countermeasure against access-driven cache-based side-channel attacks
    Mukhtar, M. Asim
    Mushtaq, Maria
    Bhatti, M. Khurram
    Lapotre, Vianney
    Gogniat, Guy
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 104
  • [44] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [45] Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe)
    Bhade, Pavitra
    Paturel, Joseph
    Sentieys, Olivier
    Sinha, Sharad
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (04)
  • [46] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [47] Side-Channel Attack Using Meet-in-the-Middle Technique
    Kim, Jongsung
    Hong, Seokhie
    COMPUTER JOURNAL, 2010, 53 (07): : 934 - 938
  • [48] An exploration of effective fuzzing for side-channel cache leakage
    Basu, Tiyash
    Aggarwal, Kartik
    Wang, Chundong
    Chattopadhyay, Sudipta
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2020, 30 (01):
  • [49] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133
  • [50] Irradiation Side-Channel Attack on Cryptographic Chip
    Qu, Ming
    Chang, Yuchun
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2016, : 41 - 45