Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks

被引:0
|
作者
Liu, Li [1 ]
Wang, An [1 ]
Zang, Wanyu [2 ]
Yu, Meng [3 ]
Chen, Songqing [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] TAMU San Antonio, San Antonio, TX USA
[3] Univ Texas San Antonio, San Antonio, TX USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Along with the wide adoption of the cloud platform, various attacks also target clouds. Due to the sharing of the underlying physical resources among different virtual machines (VMs), various side-channel attacks have been demonstrated to be capable of stealing victim's secret information, such as encryption key, by monitoring the victim's access pattern to a shared hardware, such as CPU cache. Among various defense mechanisms proposed, the hypervisor scheduling based schemes shed some light on lightweight solutions that are more likely to be adopted in practice. However, scheduling is affected by several factors that have not been thoroughly investigated so far. In this study, we aim to study in-depth the impact of various factors affecting the hypervisor scheduling, with the objective to understand their impact on mitigating these side-channel attacks. Our results can not only deepen our understanding, but also provide some guidelines to design effective scheduling based defenses in the future.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [42] A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations
    Iyer, Vishnuvardhan
    Wang, Meizhi
    Kulkarni, Jaydeep
    Yilmaz, Ali E.
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 46 - 51
  • [43] Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks
    Maghrebi, Houssem
    Danger, Jean-Luc
    Flament, Florent
    Guilley, Sylvain
    Sauvage, Laurent
    2009 3RD INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS (SCS 2009), 2009, : 324 - 329
  • [44] Secure implementation of cryptographic modules: Development of a standard evaluation environment for side channel attacks
    Satoh, Akashi
    Katashita, Toshihiro
    Sakane, Hirofumi
    Synthesiology, 2010, 3 (01): : 55 - 65
  • [45] Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques
    Kaur S.
    Singh B.
    Kaur H.
    SN Computer Science, 2021, 2 (3)
  • [46] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [47] Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks
    Barbu, Guillaume
    Castelnovi, Laurent
    Chabrier, Thomas
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 105 - 125
  • [48] A Study on Evaluation Board Requirements for Assessing Vulnerability of Cryptographic Modules to Side-Channel Attacks
    Iokibe, Kengo
    Kan, Tomonobu
    Toyota, Yoshitaka
    2020 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND SIGNAL & POWER INTEGRITY VIRTUAL SYMPOSIUM(IEEE EMC+SIPI), 2020, : 528 - 531
  • [49] A Leak Resistant Architecture against Side Channel Attacks
    Mesquita, Daniel
    Badrignan, Benoit
    Torres, Lionel
    Sassattell, Gilles
    Robert, Michel
    Bajard, Jean-Claude
    Moraes, Fernando
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 881 - 884
  • [50] Synthesis of Masking Countermeasures against Side Channel Attacks
    Eldib, Hassan
    Wang, Chao
    COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 114 - 130