HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments

被引:1
|
作者
Unal, Musa Sadik [1 ]
Javeed, Arsalan [1 ]
Yilmaz, Cemal [1 ]
Savas, Erkay [1 ]
机构
[1] Sabanci Univ, Istanbul, Turkey
来源
关键词
Cloud security; Virtualization; Microarchitecture; Side-channel attacks; Timing attacks; SIDE-CHANNEL ATTACKS; COUNTERMEASURES;
D O I
10.1007/978-3-031-20974-1_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a generic approach, called HyperDetector, to detect, isolate, and prevent ongoing timing based side-channel attacks that operate by measuring the execution times of short-running operations in virtualized environments. HyperDetector, being implemented at the level of hypervisor, uses a hardware extension for virtualization to intercept the rdtsc instructions, such that the consecutive pairs of time readings that are close to each other in time can be detected. Once potentially malicious time measurements are detected, noise is introduced into the measurements to prevent the ongoing attacks and the sequence of such measurements is analyzed at runtime by using a sliding window-based approach to determine the processes involved in the attacks. In the experiments, HyperDetector detected all the malicious processes with a perfect accuracy after these processes made few time measurements, reduced the success rates of the attacks from between 98%-99% to between 0%-0.5%, and did so with a runtime overhead of 1.14%.
引用
收藏
页码:188 / 199
页数:12
相关论文
共 50 条
  • [1] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments
    Mahipal, S.
    Sharmila, V. Ceronmani
    [J]. IAENG International Journal of Computer Science, 2023, 50 (02)
  • [2] Detector + : An approach for detecting, isolating, and preventing timing attacks
    Javeed, Arsalan
    Yilmaz, Cemal
    Savas, Erkay
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [3] Detector+: An approach for detecting, isolating, and preventing timing attacks
    Javeed, Arsalan
    Yilmaz, Cemal
    Savas, Erkay
    [J]. Computers and Security, 2021, 110
  • [4] Mitigating Security Threats in Virtualized Environments
    Yauri, Bashir Aliyu
    Abah, Joshua
    [J]. International Journal of Computer Science and Network Security, 2016, 16 (01): : 101 - 108
  • [5] Detecting and Mitigating Attacks on GPS Devices
    Burbank, Jack
    Greene, Trevor
    Kaabouch, Naima
    [J]. SENSORS, 2024, 24 (17)
  • [6] Detecting and Isolating Attacks of Deception in Networked Control Systems
    Kiriakidis, Kiriakos
    Severson, Tracie
    Connett, Brian
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, : 269 - 274
  • [7] Detecting shilling attacks in private environments
    Gunes, Ihsan
    Polat, Huseyin
    [J]. INFORMATION RETRIEVAL JOURNAL, 2016, 19 (06): : 547 - 572
  • [8] Detecting shilling attacks in private environments
    Ihsan Gunes
    Huseyin Polat
    [J]. Information Retrieval Journal, 2016, 19 : 547 - 572
  • [9] Detecting and Mitigating Storm Attacks in Mobile Access to the Cloud
    Pavloski, Mihajlo
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON FOG COMPUTING (ICFC 2019), 2019, : 53 - 58
  • [10] Strategies for detecting and mitigating DDoS attacks in SDN: A survey
    Joelle, Misenga Mumpela
    Park, Young-Hoon
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5913 - 5925