Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
نویسندگان
چکیده
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers proposed software-based defense approaches that can detect the attacks. Profiling-based detectors are lightweight detection solutions rely on hardware performance counters identify unique cache behaviors by The typically need set appropriate criteria differentiate between attack processes and normal applications. In this paper, we explore limitations of profiling-based counters.We present an scenario, called Vizard, bypass existing manipulating process. Our analysis discloses include idle periods be exploited as windows for creating events. Vizard generates counterbalancing events within hide particular evaluation exhibits effectively while maintaining high success rates. research work represents attackers counters.
منابع مشابه
SIGDROP: Signature-based ROP Detection using Hardware Performance Counters
Return-Oriented Programming (ROP) is a software exploit for system compromise. By chaining short instruction sequences from existing code pieces, ROP can bypass static code-integrity checking approaches and non-executable page protections. Existing defenses either require access to source code or binary, a customized compiler or hardware modifications, or suffer from high performance and storag...
متن کاملAutomatic Profiling of MPI Applications with Hardware Performance Counters
This paper presents an automatic counter instrumentation and profiling module added to the MPI library on Cray T3E and SGI Origin2000 systems. A detailed summary of the hardware performance counters and the MPI calls of any MPI production program is gathered during execution and written in MPI_Finalize on a special syslog file. The user can get the same information in a different file. Statisti...
متن کاملAnomaly Detection for malware identification using Hardware Performance Counters
Computers are widely used today by most people. Internet based applications, like ecommerce or ebanking attracts criminals, who using sophisticated techniques, tries to introduce malware on the victim computer. But not only computer users are in risk, also smartphones or smartwatch users, smart cities, Internet of Things devices, etc. Different techniques has been tested against malware. Curren...
متن کاملTachoRace: Exploiting Performance Counters for Run-Time Race Detection
Fixing data races is a difficult parallel programming problem, even for experienced programmers. At the moment, dynamic race detectors are frequently used because they find races more reliably than other approaches; however, the dynamic approach significantly influences application behavior during debugging because all thread’s memory accesses need to be monitored. Despite using such detectors ...
متن کاملReal time detection of cache-based side-channel attacks using hardware performance counters
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, preventing or limiting the amount of leaked information. Two of the three methods are based on machine learning techniques and all the three of them can successfully detect an attacker in about one fifth of the time required to complete the attack. There were no false positives in our test environmen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3260179