TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer

被引:0
作者
Wang, Mingyu [1 ,2 ]
Jia, Shijie [1 ]
Zheng, Fangyu [3 ]
Ma, Yuan [1 ]
Lin, Jingqiang [4 ]
Meng, Lingjia [1 ,2 ]
Ma, Ziqiang [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Key Lab Cyberspace Secur Def, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cryptol, Beijing, Peoples R China
[4] Univ Sci & Technol China, Sch Cyber Secur, Hefei, Peoples R China
[5] Ningxia Univ, Sch Informat Engn, Yinchuan, Ningxia, Peoples R China
来源
2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024 | 2024年
基金
中国国家自然科学基金;
关键词
Cache side-channel attacks; Intel VT; Fuzzy timer;
D O I
10.1109/WCNC57260.2024.10571330
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cache side-channel attacks pose a significant threat to the data security of multi-tenant public clouds. However, currently proposed defenses either lack transparency (requiring user involvement) or incur a significant performance penalty. This paper is motivated by our insightful observation for the behavior of cache side-channel attackers who employ rdtsc/rdtscp instructions for timing purposes. We have discerned a behavior pattern that enables comprehensive identification of potential attackers. Building upon this observation, we introduce TF-timer, which operates on the core principle of inspecting cache side-channel attacks using the pre-identified behavior pattern while obscuring the return values of rdtsc/rdtscp instructions. Our proposed technique preserves the properties of rdtsc/rdtscp, only blurring the attacker's timing to minimize the impact on other applications. We have implemented the prototype of TF-timer at the hypervisor layer. It is completely transparent to users and requires no hardware modifications. Our evaluation results demonstrate that TF-timer efficiently and precisely mitigates cache side-channel attacks that exploit rdtsc/rdtscp for timing, with performance penalties within 1%.
引用
收藏
页数:6
相关论文
共 21 条
  • [11] On-Demand Time Blurring to Support Side-Channel Defense
    Liu, Weijie
    Gao, Debin
    Reiter, Michael K.
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 210 - 228
  • [12] Martin R, 2012, CONF PROC INT SYMP C, P118, DOI 10.1109/ISCA.2012.6237011
  • [13] Mi Z., 2018, IEEE T DEPEND SECURE, V17, P1094
  • [14] Osvik DA, 2006, LECT NOTES COMPUT SC, V3860, P1
  • [15] PRIME plus SCOPE: Overcoming the Observer Effect for High-Precision Cache Contention Attacks
    Purnal, Antoon
    Turan, Furkan
    Verbauwhede, Ingrid
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2906 - 2920
  • [16] Varadarajan V, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P687
  • [17] Vattikonda BC, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P41
  • [18] Yarom Y., 2016, Mastik: A micro-architectural side-channel toolkit
  • [19] Yarom Y, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P719
  • [20] Zhang R., 2023, USENIX SECURITY