Mitigating Shift-Based Covert-Channel Attacks in Racetrack Last Level Caches

被引:0
|
作者
Zhao, Lei [1 ]
Zhang, Youtao [1 ]
Yang, Jun [1 ]
机构
[1] Univ Pittsburgh, Pittsburgh, PA 15260 USA
关键词
Racetrack Memory; Covert Channel; Last Level Cache;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Racetrack memory (RM, also known DWM (domain wall memory)) is an emerging memory technology that has many advantages such as low power, high density, and low access latency. Recent studies have shown that it is promising to architect RM as last level cache (LLC). Given that a RM track consists of m domains (for storing m bits data) and n access heads (1 <= n < m,), one RM access often requires multiple hops of shift to move the access head above the domain to he accessed. This leads to variant access latency, which may be exploited to initiate covert channel attacks to leak sensitive information in secure computing environment,. In this paper, we elaborate the feasibility of such attacks and propose secure head management policies to effectively mitigate the attacks in RM LLCs. Our experimental results show that the proposed schemes can reduce the new discovered shift-based covert channel's capacity by up to 260 times with modest performance overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Mitigating Traffic-based Side Channel Attacks in Bandwidth-efficient Cloud Storage
    Zuo, Pengfei
    Hua, Yu
    Wang, Cong
    Xia, Wen
    Cao, Shunde
    Zhou, Yukun
    Sun, Yuanyuan
    PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), 2017, : 638 - 638
  • [32] Fan Speed Control Based Defence for Thermal Covert Channel Attacks in Multi-Core Systems
    Rahimi, Parisa
    Singh, Amit Kumar
    Wang, Xiaohang
    2022 29TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (IEEE ICECS 2022), 2022,
  • [33] Efficient Combinations of NOMA With Distributed Antenna Systems Based on Channel Measurements for Mitigating Jamming Attacks
    Farah, Joumana
    Simon, Eric Pierre
    Laly, Pierre
    Delbarre, Gauthier
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2212 - 2221
  • [34] Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks
    Wang, Kai
    Yuan, Fengkai
    Zhao, Lutan
    Hou, Rui
    Ji, Zhenzhou
    Meng, Dan
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 89
  • [35] An Adjacent-Line-Merging Writeback Scheme for STT-RAM-Based Last-Level Caches
    Sato, Masayuki
    Shoji, Yoshiki
    Sakai, Zentaro
    Egawa, Ryusuke
    Kobayashi, Hiroaki
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2018, 4 (04): : 593 - 604
  • [36] DAMUS: Dynamic Allocation based on Write Frequency in MUlti-Retention STT-RAM based Last Level Caches
    Baranwal, Mayank
    Chugh, Udbhav
    Dalal, Shivang
    Agarwal, Sukarn
    Kapoor, Hemangee K.
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 469 - 475
  • [37] Wireless Intrusion Detection of Covert Channel Attacks in ITU-T G.9959-Based Networks
    Fuller, Jonathan
    Ramsey, Benjamin
    Pecarina, John
    Rice, Mason
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 137 - 145
  • [38] Novel STT-MRAM-based Last Level Caches for High Performance Processors using Normally-Off Architectures
    Fujita, Shinobu
    Noguchi, Hiroki
    Ikegami, Kazutaka
    Takeda, Susumu
    Nomura, Kumiko
    Abe, Keiko
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 316 - 319
  • [39] Preventing Scan-Based Side-Channel Attacks by Scan Obfuscating with a Configurable Shift Register
    Wang, Weizheng
    Chen, Yin
    Cai, Shuo
    Peng, Yan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [40] One more set: Mitigating conflict-based cache side-channel attacks by extending cache set
    Gu, Yuzhe
    Tang, Ming
    Wang, Quancheng
    Wang, Han
    Ding, Haili
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144