RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping

被引:0
作者
Zhang, Xingjian [1 ,2 ]
Gong, Haochen [1 ]
Chang, Rui [1 ,2 ]
Zhou, Yajin [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] ZJU Hangzhou Global Sci & Technol Innovat Ctr, Hangzhou 311215, Peoples R China
关键词
Cache side-channel attacks; cache hierarchy; cache randomization; SIDE-CHANNEL ATTACKS;
D O I
10.1109/TIFS.2024.3368862
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conflict-based cache attacks can leak critical information from target programs. Accordingly, randomization-based cache designs have emerged as an efficient and LLC-favorable way to mitigate such attacks. However, later investigations have revealed several problems with these designs. Specifically, we identify limited randomness and coarse-grained protection as key issues of previous designs. To solve these issues, we propose Recast, a secure cache design with address-sensitive secret generation and tweakable index randomization. Our insight is that cache modules at different levels can work collaboratively to enhance their security. Address-sensitive secret generation in private caches generates a secret value for each address upon cache misses. The shared cache in Recast uses tweakable index randomization, where the cryptographic function uses the secret value from private caches as the input to calculate the cache set index. Therefore, Recast achieves fine-grained dynamic mapping. We implement Recast in the gem5 simulator. We use a micro-benchmark and a benchmark suite to showcase the security of Recast. Our performance evaluations on SPEC 2017 and PARSEC benchmarks show that Recast incurs 2.29% and 2.03% performance overhead. Moreover, Recast with the LRU replacement policy has only 0.51% and 1.04% performance overhead on the two benchmarks. Therefore, Recast provides higher security guarantees with minimal performance overhead.
引用
收藏
页码:3758 / 3771
页数:14
相关论文
共 3 条
  • [1] Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks
    Wang, Kai
    Yuan, Fengkai
    Zhao, Lutan
    Hou, Rui
    Ji, Zhenzhou
    Meng, Dan
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 89
  • [2] One more set: Mitigating conflict-based cache side-channel attacks by extending cache set
    Gu, Yuzhe
    Tang, Ming
    Wang, Quancheng
    Wang, Han
    Ding, Haili
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [3] Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks
    Song, Wei
    Xue, Zihan
    Han, Jinchi
    Li, Zhenzhen
    Liu, Peng
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (04) : 1019 - 1033