Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

被引:20
|
作者
Zhou, Yanqi [1 ]
Wagh, Sameer [1 ]
Mittal, Prateek [1 ]
Wentzlaff, David [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
hardware; security; memory system; INFORMATION; PRIVACY;
D O I
10.1109/HPCA.2017.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information leaks based on timing side channels in computing devices have serious consequences for user security and privacy. In particular, malicious applications in multi-user systems such as data centers and cloud-computing environments can exploit memory timing as a side channel to infer a victim's program access patterns/phases. Memory timing channels can also be exploited for covert communications by an adversary. We propose Camouflage, a hardware solution to mitigate timing channel attacks not only in the memory system, but also along the path to and from the memory system (e.g. NoC, memory scheduler queues). Camouflage introduces the novel idea of shaping memory requests' and responses' inter-arrival time into a pre-determined distribution for security purposes, even creating additional fake traffic if needed. This limits untrusted parties (either cloud providers or co-scheduled clients) from inferring information from another security domain by probing the bus to and from memory, or analyzing memory response rate. We design three different memory traffic shaping mechanisms for different security scenarios by having Camouflage work on requests, responses, and bi-directional (both) traffic. Camouflage is complementary to ORAMs and can be optionally used in conjunction with ORAMs to protect information leaks via both memory access timing and memory access patterns. Camouflage offers a tunable trade-off between system security and system performance. We evaluate Camouflage's security and performance both theoretically and via simulations, and find that Camouflage outperforms state-of-the-art solutions in performance by up to 50%.
引用
收藏
页码:337 / 348
页数:12
相关论文
共 50 条
  • [1] Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks
    Cui, Weiqi
    Yu, Jiangmin
    Gong, Yanmin
    Chan-Tin, Eric
    [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1579 - 1584
  • [2] A schedule randomization policy to mitigate timing attacks in WirelessHART networks
    Ankita Samaddar
    Arvind Easwaran
    Rui Tan
    [J]. Real-Time Systems, 2020, 56 : 452 - 489
  • [3] Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks
    Kobayashi, Yasuyuki
    Kaji, Yuichi
    Seki, Hiroyuki
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 561 - 565
  • [4] A schedule randomization policy to mitigate timing attacks in WirelessHART networks
    Samaddar, Ankita
    Easwaran, Arvind
    Tan, Rui
    [J]. REAL-TIME SYSTEMS, 2020, 56 (04) : 452 - 489
  • [5] Cooperated Traffic Shaping With Traffic Estimation and Path Reallocation to Mitigate Microbursts in IoT Backhaul Network
    Honda, Kazuaki
    Shibata, Naotaka
    Harada, Rintaro
    Ishida, Yota
    Akashi, Kunio
    Kaneko, Shin
    Miyachi, Toshiyuki
    Terada, Jun
    [J]. IEEE ACCESS, 2021, 9 : 162190 - 162196
  • [6] Online Distributed Schedule Randomization to Mitigate Timing Attacks in Industrial Control Systems
    Samaddar, Ankita
    Easwaran, Arvind
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (06)
  • [7] Traffic Shaping Impact of Network Coding on Spectrum Predictability and Jamming Attacks
    Wang, Shanshan
    Sagduyu, Yalin E.
    Zhang, Junshan
    Li, Jason Hongjun
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 293 - 298
  • [8] "They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks
    Jancar, Jan
    Fourne, Marcel
    Braga, Daniel De Almeida
    Sabt, Mohamed
    Schwabe, Peter
    Barthe, Gilles
    Fouque, Pierre-Alain
    Acar, Yasemin
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 632 - 649
  • [9] FASE: Fast Selective Flushing to Mitigate Contention-based Cache Timing Attacks
    Li, Tuo
    Parameswaran, Sri
    [J]. PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 541 - 546
  • [10] Web Fingerprint Defense with Timing-assistant Traffic Burst Shaping
    Chen, Bo
    Yang, Chen
    Wang, Can
    Wu, Xuangou
    [J]. 2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, : 333 - 340