SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison

被引:3
|
作者
Wang, Limin [1 ]
Bui, Lei [1 ]
Song, Fu [2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Tech, Nanjing 210023, Jiangsu, Peoples R China
[2] ShanghaiTech Univ, Sch Informat Sci & technol, Shanghai 201210, Peoples R China
基金
中国国家自然科学基金;
关键词
TIME;
D O I
10.1109/DAC56929.2023.10247890
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cache side-channel attacks (CSCAs), capable of deducing secrets by analyzing timing differences in the shared cache behavior of modern processors, pose a serious security threat. While there are approaches for detecting CSCAs and mitigating information leaks, they either fail to detect and classify new variants or have to impractically update deployed systems (e.g., CPU). In this work, we propose a novel approach, named SCAGUARD, to detect and classify CSCAs via attack behavior modeling and similarity comparison. Specifically, we introduce the notion of cache state transition enhanced basic block sequences (CST-BBSes) to model attack behaviors which is able to capture both attackrelevant syntactic code information and semantic cache information. We propose an approach to automatically construct CST-BBS models from binary programs. To detect and classify attacks, we adapt a dynamic time warping algorithm to compare the similarity of CST-BBSes between attack and target programs. We implement our approach in a tool SCAGUARD and evaluate it using real-world attacks and diverse benign programs. The results confirm the effectiveness of our approach, compared over existing detection approaches. In particular, SCAGUARD significantly outperforms the other detection approaches on new variants.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Protecting Shared Virtualized Environments against Cache Side-channel Attacks
    Albalawi, Abdullah
    Vassilakis, Vassilios G.
    Calinescu, Radu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 507 - 514
  • [32] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [33] Cache Side-channel Attacks and Defenses of the Sliding Window Algorithm in TEEs
    Kou, Zili
    Sinha, Sharad
    He, Wenjian
    Zhang, Wei
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [34] Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity
    Crane, Stephen
    Homescu, Andrei
    Brunthaler, Stefan
    Larsen, Per
    Franz, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [35] Efficient RNIC Cache Side-Channel Attack Detection Through DPU-Driven Architecture
    Liao, Yunkun
    Wu, Jingya
    Lu, Wenyan
    Li, Xiaowei
    Yan, Guihai
    EURO-PAR 2024: PARALLEL PROCESSING, PART II, EURO-PAR 2024, 2024, 14802 : 3 - 17
  • [36] Adaptive caches as a defense mechanism against cache side-channel attacks
    Sahan Bandara
    Michel A. Kinsy
    Journal of Cryptographic Engineering, 2021, 11 : 239 - 255
  • [37] Cache Side-channel Attack to Recover Plaintext against Datagram TLS
    Tang, Ye
    Li, Huiyun
    Xu, Guoqing
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [38] A Small Dummy Disrupting Database Reconstruction in a Cache Side-Channel Attack
    Han, Hyeonwoo
    Lee, Eun-Kyu
    Jo, Junghee
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (10) : 1054 - 1064
  • [39] A New Prime and Probe Cache Side-Channel Attack for Cloud Computing
    Younis, Younis A.
    Kifayat, Kashif
    Shi, Qi
    Askwith, Bob
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1719 - 1725
  • [40] Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters
    Bazm, Mohammad-Mahdi
    Sautereau, Thibaut
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 7 - 12