PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring

2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED)(2022)

引用 0|浏览36
暂无评分
摘要
Recent work has demonstrated the security risk associated with micro-architecture side-channels. The cache timing side-channel is a particularly popular target due to its availability and high leakage bandwidth. Existing proposals for defending cache side-channel attacks either degrade cache performance and/or limit cache sharing, hence, should only be invoked when the system is under attack. A lightweight monitoring mechanism that detects malicious micro-architecture manipulation in realistic environments is essential for the judicious deployment of these defense mechanisms.In this paper, we propose PREDATOR, a cache side-channel attack detector that identifies cache events caused by an attacker. To detect side-channel attacks in noisy environments, we take advantage of the observation that, unlike non-specific noises, an active attacker alters victim’s micro-architectural states on security critical accesses and thus causes the victim extra cache events on those accesses. PREDATOR uses precise performance counters to collect detailed victim’s access information and analyzes location-based deviations. PREDATOR is capable of detecting five different attacks with high accuracy and limited performance overhead in complex noisy execution environments. PREDATOR remains effective even when the attacker slows the attack rate by 256 times. Furthermore, PREDATOR is able to accurately report details about the attack such as the instruction that accesses the attacked data. In the case of GnuPG RSA [20], PREDATOR can pinpoint the square/multiply operations in the Modulo-Reduce algorithm; and in the case of OpenSSL AES [45], it can identify the accesses to the T e -Table.
更多
查看译文
关键词
microarchitecture side-channels,high leakage bandwidth,side-channel attacks,degrade cache performance,limit cache sharing,lightweight monitoring mechanism,microarchitecture manipulation,security critical accesses,victim extra cache events,precise performance counters,limited performance overhead,complex noisy execution environments,attack rate,PREDATOR,attacked data,cache side-channel attack detector,precise event monitoring
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要