SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison

被引:3
|
作者
Wang, Limin [1 ]
Bui, Lei [1 ]
Song, Fu [2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Tech, Nanjing 210023, Jiangsu, Peoples R China
[2] ShanghaiTech Univ, Sch Informat Sci & technol, Shanghai 201210, Peoples R China
基金
中国国家自然科学基金;
关键词
TIME;
D O I
10.1109/DAC56929.2023.10247890
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cache side-channel attacks (CSCAs), capable of deducing secrets by analyzing timing differences in the shared cache behavior of modern processors, pose a serious security threat. While there are approaches for detecting CSCAs and mitigating information leaks, they either fail to detect and classify new variants or have to impractically update deployed systems (e.g., CPU). In this work, we propose a novel approach, named SCAGUARD, to detect and classify CSCAs via attack behavior modeling and similarity comparison. Specifically, we introduce the notion of cache state transition enhanced basic block sequences (CST-BBSes) to model attack behaviors which is able to capture both attackrelevant syntactic code information and semantic cache information. We propose an approach to automatically construct CST-BBS models from binary programs. To detect and classify attacks, we adapt a dynamic time warping algorithm to compare the similarity of CST-BBSes between attack and target programs. We implement our approach in a tool SCAGUARD and evaluate it using real-world attacks and diverse benign programs. The results confirm the effectiveness of our approach, compared over existing detection approaches. In particular, SCAGUARD significantly outperforms the other detection approaches on new variants.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296
  • [22] Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks
    Mosquera, Fernando
    Kavi, Krishna
    Mehta, Gayatri
    John, Lizy K.
    2023 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC, 2023,
  • [23] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [24] Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
    Mushtaq, Maria
    Mukhtar, Muhammad Asim
    Lapotre, Vianney
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    INFORMATION SYSTEMS, 2020, 92
  • [25] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [26] Adaptive caches as a defense mechanism against cache side-channel attacks
    Bandara, Sahan
    Kinsy, Michel A.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (03) : 239 - 255
  • [27] Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks
    Bandara, Sahan
    Kinsy, Michel A.
    PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19), 2019, : 55 - 64
  • [28] CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks
    Hao, Sirui
    He, Junjiang
    Li, Wenshan
    Li, Tao
    Yang, Geying
    Fang, Wenbo
    Chen, Wanying
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 695 - 709
  • [29] REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection
    Mao, Yuxiao
    Migliore, Vincent
    Nicomette, Vincent
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 704 - 709
  • [30] Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks
    Townley, Daniel
    Arikan, Kerem
    Liu, Yu David
    Ponomarev, Dmitry
    Ergin, Oguz
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2839 - 2856