RT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks

نویسندگان

چکیده

Since cache side-channel attacks have been serious security threats to multi-tenant systems, there several studies protect systems against the attacks. However, prior limitations in determining only existence of attack and/or occupying too many computing resources runtime. We propose a low-overhead pinpointing solution, called RT-Sniper, overcome such limitations. RT-Sniper employs two-level filtering mechanism minimize performance overhead. It first monitors hardware events per core and isolates suspected run malicious process. Then among processes running on selected core, pinpoints process through per-process monitoring approach. With core-level filtering, has an advantage overhead compared previous works. evaluate Flush+Reload Prime+Probe SPEC2017, LMBench, PARSEC benchmarks multi-core systems. Our evaluation demonstrates that by is negligible (0.3% for single-threaded applications 2.05% multi-threaded applications). Compared defense solutions attacks, exhibits better detection with lower

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defense against Cache-based Side Channel Attacks for Secure Cloud Computing

Cloud computing is a combination of various established technologies like virtualization, dynamic elasticity, broad band Internet, etc. to provide configurable computer resources as a service to the users. Resources are shared among many distrusting clients by abstracting the underlying infrastructure using virtualization. While cloud computing has many practical benefits, resource sharing in c...

متن کامل

Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity

We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity techniques transform each program trace identically. Our diversity based technique instead transforms programs to make each program trace unique. This approach offers probabilistic protection against both online and off-l...

متن کامل

Partitioned Cache Architecture as a Side-Channel Defence Mechanism

Recent research has produced a number of viable side-channel attack methods based on the data-dependant behaviour of microprocessor cache memory. Most proposed defence mechanisms are software based and mainly act to increase the attackers workload rather than obviate the attack entirely. In this paper we investigate the use of a con gurable cache architecture to provide hardware assisted defenc...

متن کامل

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2021

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics10222748