Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks

被引:1
|
作者
Mosquera, Fernando [1 ]
Kavi, Krishna [1 ]
Mehta, Gayatri [1 ]
John, Lizy K. [2 ]
机构
[1] Univ North Texas, Denton, TX 76205 USA
[2] Univ Texas Austin, Austin, TX USA
关键词
Cache Side-Channel attacks; Prime & Probe; Flush & Reload; Evict & Time; Victim Cache;
D O I
10.1109/SVCC56964.2023.10165527
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cache side-channel attacks have exposed serious security vulnerabilities in modern architectures. These attacks rely on measuring cache access times to determine if an access to an address is a hit or a miss in the cache. Such information can be used to identify which addresses were accessed by the victim, which in turn can be used to reveal or at least guess the information accessed by the victim. Mitigating the attacks while preserving the performance has been a challenge. The hardware mitigation techniques used in the literature include complex cache indexing mechanisms, partitioning cache memories, and hiding or undoing the effects of speculation. In this paper, we present a Guard Cache to obfuscate cache timing, making it more difficult for cache timing attacks to succeed. We create false cache hits by using the Guard Cache as a Victim Cache, and false cache misses by randomly evicting cache lines. Our obfuscations can be turned-on and turned-off on demand to protect critical sections or randomly to further obfuscate cache access times. We show that our false hits cause very minimal performance penalties ranging between -0.2% to 3.0% performance loss, while false misses can cause higher performance losses. We also show that our approach causes different number of cache hits and misses and different addresses causing misses when compared to traditional caches, demonstrating that common side-channel attacks such as Prime &Probe, Flush &Reload or Evict &Time are likely to misinterpret victims' memory accesses. We use very small Guard Caches (1KiB-2KiB at L1 or 2KiB-4KiB at L2) requiring very minimal additional hardware. The hardware needed for random evictions is also minimal.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Sha, Zhangyu
    Liu, Yuxin
    Meng, Dan
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT I, ICIC 2024, 2024, 14875 : 62 - 74
  • [32] On the Security of Practical Mail User Agents against Cache Side-Channel Attacks
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    APPLIED SCIENCES-BASEL, 2020, 10 (11):
  • [33] Symbolic Verification of Cache Side-Channel Freedom
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (11) : 2812 - 2823
  • [34] Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters
    Bazm, Mohammad-Mahdi
    Sautereau, Thibaut
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 7 - 12
  • [35] Selection of Best Fit Hardware Performance Counters to Detect Cache Side-Channel Attacks
    Koc, Melis Kapotoglu
    Altilar, Deniz Turgay
    PROCEEDINGS OF THE 2023 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, SAT-CPS 2023, 2023, : 17 - 22
  • [36] Extending the classical side-channel analysis framework to access-driven cache attacks
    Guo, Pengfei
    Yan, Yingjian
    Zhang, Fan
    Zhu, Chunsheng
    Zhang, Lichao
    Dai, Zibin
    COMPUTERS & SECURITY, 2023, 129
  • [37] SoK: CanWe Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
    Kosasih, William
    Feng, Yusi
    Chuengsatiansup, Chitchanok
    Yarom, Yuval
    Zhu, Ziyuan
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 172 - 185
  • [38] Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks
    Wang, Han
    Hafiz, Syed Mahbub
    Patwari, Kartik
    Chuah, Chen-Nee
    Shafiq, Zubair
    Homayoun, Houman
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 1515 - 1520
  • [39] Cache Side-Channel Attack on Mail User Agent
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 236 - 238
  • [40] An exploration of effective fuzzing for side-channel cache leakage
    Basu, Tiyash
    Aggarwal, Kartik
    Wang, Chundong
    Chattopadhyay, Sudipta
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2020, 30 (01):