Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

被引:20
|
作者
Zhou, Yanqi [1 ]
Wagh, Sameer [1 ]
Mittal, Prateek [1 ]
Wentzlaff, David [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
hardware; security; memory system; INFORMATION; PRIVACY;
D O I
10.1109/HPCA.2017.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information leaks based on timing side channels in computing devices have serious consequences for user security and privacy. In particular, malicious applications in multi-user systems such as data centers and cloud-computing environments can exploit memory timing as a side channel to infer a victim's program access patterns/phases. Memory timing channels can also be exploited for covert communications by an adversary. We propose Camouflage, a hardware solution to mitigate timing channel attacks not only in the memory system, but also along the path to and from the memory system (e.g. NoC, memory scheduler queues). Camouflage introduces the novel idea of shaping memory requests' and responses' inter-arrival time into a pre-determined distribution for security purposes, even creating additional fake traffic if needed. This limits untrusted parties (either cloud providers or co-scheduled clients) from inferring information from another security domain by probing the bus to and from memory, or analyzing memory response rate. We design three different memory traffic shaping mechanisms for different security scenarios by having Camouflage work on requests, responses, and bi-directional (both) traffic. Camouflage is complementary to ORAMs and can be optionally used in conjunction with ORAMs to protect information leaks via both memory access timing and memory access patterns. Camouflage offers a tunable trade-off between system security and system performance. We evaluate Camouflage's security and performance both theoretically and via simulations, and find that Camouflage outperforms state-of-the-art solutions in performance by up to 50%.
引用
收藏
页码:337 / 348
页数:12
相关论文
共 50 条
  • [41] Camouflage of network traffic to resist attack (CONTRA)
    Weinstein, W.
    Lepanto, J.
    [J]. Proc. - DARPA Inf. Surviv. Conf. Expo., DISCEX, (126-127):
  • [42] Camouflage of network traffic to resist attack (CONTRA)
    Weinstein, W
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 126 - 127
  • [43] Timing analysis of keystrokes and timing attacks on SSH
    Song, DXD
    Wagner, D
    Tian, XQ
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 337 - 352
  • [44] Camouflage Is All You Need: Evaluating and Enhancing Transformer Models Robustness Against Camouflage Adversarial Attacks
    Huertas-Garcia, Alvaro
    Martin, Alejandro
    Huertas-Tato, Javier
    Camacho, David
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024,
  • [45] Mitigate effects of noise on timing and functionality
    Moretti, G
    [J]. EDN, 2000, 45 (15) : 22 - 22
  • [46] Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
    Johannes Mittmann
    Werner Schindler
    [J]. Journal of Cryptographic Engineering, 2021, 11 : 369 - 397
  • [47] Timing attacks and local timing attacks against Barrett's modular multiplication algorithm
    Mittmann, Johannes
    Schindler, Werner
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (04) : 369 - 397
  • [48] ATM traffic policing and traffic shaping measurements
    Pugaczewski, J
    Sanderson, D
    Hoffman, D
    [J]. PERFORMANCE AND CONTROL OF NETWORK SYSTEMS, 1997, 3231 : 230 - 246
  • [49] Constitutional parasitism, camouflage, and pretense: Shaping citizenship through subterfuge
    Ahmed, Farrah
    [J]. ICON-INTERNATIONAL JOURNAL OF CONSTITUTIONAL LAW, 2023, 21 (01): : 285 - 307
  • [50] TRAFFIC SHAPING FOR VBR TRAFFIC IN ATM NETWORKS
    YAMANAKA, N
    SATO, Y
    SATO, K
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (10) : 1105 - 1108