Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks

被引:1
|
作者
Mosquera, Fernando [1 ]
Kavi, Krishna [1 ]
Mehta, Gayatri [1 ]
John, Lizy K. [2 ]
机构
[1] Univ North Texas, Denton, TX 76205 USA
[2] Univ Texas Austin, Austin, TX USA
关键词
Cache Side-Channel attacks; Prime & Probe; Flush & Reload; Evict & Time; Victim Cache;
D O I
10.1109/SVCC56964.2023.10165527
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cache side-channel attacks have exposed serious security vulnerabilities in modern architectures. These attacks rely on measuring cache access times to determine if an access to an address is a hit or a miss in the cache. Such information can be used to identify which addresses were accessed by the victim, which in turn can be used to reveal or at least guess the information accessed by the victim. Mitigating the attacks while preserving the performance has been a challenge. The hardware mitigation techniques used in the literature include complex cache indexing mechanisms, partitioning cache memories, and hiding or undoing the effects of speculation. In this paper, we present a Guard Cache to obfuscate cache timing, making it more difficult for cache timing attacks to succeed. We create false cache hits by using the Guard Cache as a Victim Cache, and false cache misses by randomly evicting cache lines. Our obfuscations can be turned-on and turned-off on demand to protect critical sections or randomly to further obfuscate cache access times. We show that our false hits cause very minimal performance penalties ranging between -0.2% to 3.0% performance loss, while false misses can cause higher performance losses. We also show that our approach causes different number of cache hits and misses and different addresses causing misses when compared to traditional caches, demonstrating that common side-channel attacks such as Prime &Probe, Flush &Reload or Evict &Time are likely to misinterpret victims' memory accesses. We use very small Guard Caches (1KiB-2KiB at L1 or 2KiB-4KiB at L2) requiring very minimal additional hardware. The hardware needed for random evictions is also minimal.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] "Stubborn" Strategy to Mitigate Remaining Cache Misses
    Nomura, Hayato
    Katchi, Hiroyuki
    Irie, Hidetsugu
    Sakai, Shuichi
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 388 - 391
  • [42] Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense
    Sprabery, Read
    Evchenko, Konstantin
    Raj, Abhilash
    Bobba, Rakesh B.
    Mohan, Sibin
    Campbell, Roy
    2018 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2018), 2018, : 34 - 40
  • [43] ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms
    Minkin, Marina
    Kasikci, Baris
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN 2024, 2024, : 223 - 237
  • [44] Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
    Mushtaq, Maria
    Mukhtar, Muhammad Asim
    Lapotre, Vianney
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    INFORMATION SYSTEMS, 2020, 92
  • [45] Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks
    Niazmand, Behrad
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 672 - 676
  • [46] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments
    Mahipal, S.
    Sharmila, V. Ceronmani
    IAENG International Journal of Computer Science, 2023, 50 (02)
  • [47] Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks
    Feng, Yusi
    Zhu, Ziyuan
    Li, Shuan
    Liu, Ben
    Wang, Huozhu
    Meng, Dan
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1132 - 1140
  • [48] Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
    Mushtaq, Maria
    Akram, Ayaz
    Bhatti, Muhammad Khurram
    Ali, Usman
    Lapotre, Vianney
    Gogniat, Guy
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019, : 64 - 72
  • [49] Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
    Gras, Ben
    Razavi, Kaveh
    Bos, Herbert
    Giuffrida, Cristiano
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 955 - 972
  • [50] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Atici, Ali Can
    Yilmaz, Cemal
    Savas, Erkay
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84