Eviction Bit and Inclusive Cache Based Replacement Policy for Side Channel Attack

نویسنده

  • Maheswara Reddy
چکیده

Modern Cloud Computing Architecture shares physical resources throughout diverse programs so as to maximize the efficiency based on area, energy, and cost. In the most widelyused environment, where each core has more than single level private caches, and shares an inclusive lower-level cache with all the other cores. Regrettably, sharing causes a hazard to security, though procedures are completely remote on rational level, employing a physical resource among them generally tells that single procedures resource usage outline could be witnessed by outsiders. Cache replacement policies are one of the prevalently employed countermeasures that considerably impact the performance of side channel attacks in cloud computing. In this paper, a new replacement scheme is suggested to safeguard in contrast to these conflict side channel attack known as Eviction bit and Inclusive Cache based Replacement policy. An Eviction Bit is assigned to each cache line that is targeted for replacement and the detection of inclusive cache is done. These two steps added increased the cache replacement policy performance efficiency. The experimental results are performed on 8 different cores where 7 cores are victim and 1 is a spy core that seeks the confidential information of victim. This showed that the proposed approach has better performance efficiency compared to existing SHARP and Hybrid mitigation technique.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Hierarchy-Aware Cache Replacement Policy (SHARP)

In cache-based side channel attacks, a spy that shares a cache with a victim probes cache locations to extract information on the victim’s access patterns. For example, in evict+reload, the spy repeatedly evicts and then reloads a probe address, checking if the victim has accessed the address in between the two operations. While there are many proposals to combat these cache attacks, they all h...

متن کامل

The 5th Annual Inter Research Institute Student Seminar in Computer Science

Caching frequently accessed data items on the client side is an effective technique to improve the system performance in mobile environment. Due to cache size limitations, the choice of cache replacement techniques used to find a suitable subset of items for eviction from cache becomes important. In this paper, we propose a new cost function based cache replacement policy, Predicted Region Base...

متن کامل

Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks

Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES is an especially attractive target since it makes extensive use of cache-resident table lookups. We consider two attack scenarios where either the plaintext or ciphertext is known. We employ a mul...

متن کامل

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation

Algebraic side-channel attack (ASCA) is a powerful cryptanalysis technique different from conventional side-channel attacks. This paper studies ASCA from three aspects: enhancement, analysis and application. To enhance ASCA, we propose a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope the multiple deductions caused by inaccurate measurements or interferences. For the fir...

متن کامل

Eviction-based Cache Placement for Storage Caches

Most previous work on buffer cache management uses an access-based placement policy that places a data block into a buffer cache at the block’s access time. This paper presents an eviction-based placement policy for a storage cache that usually sits in the lower level of a multi-level buffer cache hierarchy and thereby has different access patterns from upper levels. The main idea of the evicti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017