SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison

被引:3
|
作者
Wang, Limin [1 ]
Bui, Lei [1 ]
Song, Fu [2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Tech, Nanjing 210023, Jiangsu, Peoples R China
[2] ShanghaiTech Univ, Sch Informat Sci & technol, Shanghai 201210, Peoples R China
基金
中国国家自然科学基金;
关键词
TIME;
D O I
10.1109/DAC56929.2023.10247890
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cache side-channel attacks (CSCAs), capable of deducing secrets by analyzing timing differences in the shared cache behavior of modern processors, pose a serious security threat. While there are approaches for detecting CSCAs and mitigating information leaks, they either fail to detect and classify new variants or have to impractically update deployed systems (e.g., CPU). In this work, we propose a novel approach, named SCAGUARD, to detect and classify CSCAs via attack behavior modeling and similarity comparison. Specifically, we introduce the notion of cache state transition enhanced basic block sequences (CST-BBSes) to model attack behaviors which is able to capture both attackrelevant syntactic code information and semantic cache information. We propose an approach to automatically construct CST-BBS models from binary programs. To detect and classify attacks, we adapt a dynamic time warping algorithm to compare the similarity of CST-BBSes between attack and target programs. We implement our approach in a tool SCAGUARD and evaluate it using real-world attacks and diverse benign programs. The results confirm the effectiveness of our approach, compared over existing detection approaches. In particular, SCAGUARD significantly outperforms the other detection approaches on new variants.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks
    Kim, Hodong
    Hahn, Changhee
    Kim, Hyunwoo J.
    Shin, Youngjoo
    Hur, Junbeom
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1672 - 1686
  • [12] Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Sha, Zhangyu
    Liu, Yuxin
    Meng, Dan
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT I, ICIC 2024, 2024, 14875 : 62 - 74
  • [13] Preventing and Detecting Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis A.
    Kifayat, Kashif
    Hussain, Abir
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [14] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [15] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353
  • [16] Micro-architectural Cache Side-Channel Attacks and Countermeasures
    Shen, Chaoqun
    Chen, Congcong
    Zhang, Jiliang
    2021 26TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2021, : 441 - 448
  • [17] MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
    Wan, Junpeng
    Bi, Yanxiang
    Zhou, Zhe
    Li, Zhou
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1506 - 1524
  • [18] Side-Channel Attack on STTRAM based Cache for Cryptographic Application
    Khan, Mohammad Nasim Imtiaz
    Bhasin, Shivam
    Yuan, Alex
    Chattopadhyay, Anupam
    Ghosh, Swaroop
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 33 - 40
  • [19] Last-Level Cache Side-Channel Attacks are Practical
    Liu, Fangfei
    Yarom, Yuval
    Ge, Qian
    Heiser, Gernot
    Lee, Ruby B.
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 605 - 622
  • [20] Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events
    Kim, Hodong
    Hahn, Changhee
    Hur, Junbeom
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 28 - 31