SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison

被引:3
|
作者
Wang, Limin [1 ]
Bui, Lei [1 ]
Song, Fu [2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Tech, Nanjing 210023, Jiangsu, Peoples R China
[2] ShanghaiTech Univ, Sch Informat Sci & technol, Shanghai 201210, Peoples R China
基金
中国国家自然科学基金;
关键词
TIME;
D O I
10.1109/DAC56929.2023.10247890
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cache side-channel attacks (CSCAs), capable of deducing secrets by analyzing timing differences in the shared cache behavior of modern processors, pose a serious security threat. While there are approaches for detecting CSCAs and mitigating information leaks, they either fail to detect and classify new variants or have to impractically update deployed systems (e.g., CPU). In this work, we propose a novel approach, named SCAGUARD, to detect and classify CSCAs via attack behavior modeling and similarity comparison. Specifically, we introduce the notion of cache state transition enhanced basic block sequences (CST-BBSes) to model attack behaviors which is able to capture both attackrelevant syntactic code information and semantic cache information. We propose an approach to automatically construct CST-BBS models from binary programs. To detect and classify attacks, we adapt a dynamic time warping algorithm to compare the similarity of CST-BBSes between attack and target programs. We implement our approach in a tool SCAGUARD and evaluate it using real-world attacks and diverse benign programs. The results confirm the effectiveness of our approach, compared over existing detection approaches. In particular, SCAGUARD significantly outperforms the other detection approaches on new variants.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170
  • [42] MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks
    Yang, Chao
    Guo, Yunfei
    Hu, Hongchao
    IEEE ACCESS, 2019, 7 : 2179 - 2199
  • [43] SCAAT: Secure Cache Alternative Address Table for mitigating cache logical side-channel attacks
    Shalabi, Ameer
    Ghasempouri, Tara
    Ellervee, Peeter
    Raik, Jaan
    2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 213 - 217
  • [44] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Mushtaq, Maria
    Yousaf, Muhammad Muneeb
    Bhatti, Muhammad Khurram
    Lapotre, Vianney
    Gogniat, Guy
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 731 - 747
  • [45] Real time detection of cache-based side-channel attacks using hardware performance counters
    Chiappetta, Marco
    Savas, Erkay
    Yilmaz, Cemal
    APPLIED SOFT COMPUTING, 2016, 49 : 1162 - 1174
  • [46] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Maria Mushtaq
    Muhammad Muneeb Yousaf
    Muhammad Khurram Bhatti
    Vianney Lapotre
    Guy Gogniat
    Annals of Telecommunications, 2022, 77 : 731 - 747
  • [47] CONDENSE: A Moving Target Defense Approach for Mitigating Cache Side-Channel Attacks
    Dai, Chenxi
    Adegbija, Tosiron
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (03) : 114 - 119
  • [48] Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 363 - 392
  • [49] Cache Side-Channel Attacks: Flush plus Flush and the Countermeasures Time Gap
    Bhebe, Keith Nyasha
    Liu, Jian
    Qu, Wenyu
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 880 - 887
  • [50] Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite
    Shahverdi, Aria
    Shirinov, Mahammad
    Dachman-Soled, Dana
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1019 - 1035