Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks

被引:0
|
作者
Kim, Hodong [1 ]
Hahn, Changhee [2 ]
Kim, Hyunwoo J. [1 ]
Shin, Youngjoo [3 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
[2] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 01811, South Korea
[3] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
关键词
Cache side-channel attack detection; multiclass classification; PRIME plus ABORT; PRIME plus PROBE; FLUSH plus RE-LOAD; TIME-SERIES PREDICTION;
D O I
10.1109/TIFS.2023.3340088
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cache side-channel attack retrieves victim's sensitive information from a system by exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as FLUSH+RELOAD and PRIME+PROBE are likely to incur numerous cache events, such as cache hits and misses, many previous strategies have focused on monitoring cache events for attack detection. However, as recently proposed attacks such as PRIME+ABORT have exploited the other events as side-channels, it has become challenging to detect them by monitoring only cache events. In this paper, we investigate PRIME+ABORT attack and identifies Intel TSX hardware events are tightly coupled with it as well as cache events. Based on our finding, we propose a novel deep learning-based cache side-channel attack detection method called FRIME. It can concurrently detect not only the conventional attacks such as FLUSH+RELOAD, PRIME+PROBE, but also PRIME+ABORT by leveraging both event types. In order to demonstrate the efficacy of our cache side-channel attack detection scheme in diverse workload conditions in the real world, we implement it using MLP, RNN, and LSTM deep learning models, demonstrating LSTM-based method outperforms the other implementations in terms of detection accuracy.
引用
收藏
页码:1672 / 1686
页数:15
相关论文
共 50 条
  • [21] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [22] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [23] Victims Can Be Saviors: A Machine Learning-based Detection for Micro-Architectural Side-Channel Attacks
    Alam, Manaar
    Bhattacharya, Sarani
    Mukhopadhyay, Debdeep
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (02)
  • [24] Effective Deep Learning-based Side-Channel Analyses Against ASCAD
    Liu, Junkai
    Zheng, Shihui
    Gu, Lize
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 514 - 523
  • [25] A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis
    Li, Huimin
    Krcek, Marina
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 126 - 143
  • [26] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [27] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [28] Toward an Optimal Countermeasure for Cache Side-Channel Attacks
    Shrivastava, Nivedita
    Sarangi, Smruti R.
    IEEE EMBEDDED SYSTEMS LETTERS, 2023, 15 (03) : 141 - 144
  • [29] Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
    Mushtaq, Maria
    Mukhtar, Muhammad Asim
    Lapotre, Vianney
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    INFORMATION SYSTEMS, 2020, 92
  • [30] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16