Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning

被引:0
作者
Tong, Zhongkai [1 ,2 ]
Zhu, Ziyuan [1 ,2 ]
Sha, Zhangyu [1 ,2 ]
Liu, Yuxin [1 ,2 ]
Meng, Dan [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT I, ICIC 2024 | 2024年 / 14875卷
关键词
Cache Side-channel attack; Detection speed; Machine learning; Attack detection; Data analysis;
D O I
10.1007/978-981-97-5663-6_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Contemporary research on cache side-channel attack detection frequently emphasizes accuracy while overlooking crucial factors such as overhead and detection speed. In response to these challenges, we analyze the combined effect of detection speed on system loss and detection accuracy. We find that increasing the hardware event sampling rate not only results in excessive system loss but also decreases the accuracy of constructed cache side-channel attack detection. In this paper, we verify on different hardware platforms that establishing a critical hardware event sampling interval is essential for constructing effective attack detection. This allows for the quick and accurate identification of three cache side-channel attacks while keeping system overhead low. Through experiments, we determined that the critical hardware event sampling interval for the two hardware platforms used in this paper is close to 500 us. The accuracy of the attack detection constructed on the I5-7200U platform finally reaches 97.39%, while on the I7-7700 platform, it reaches 99.31%. The CPU utilization from Sampling of hardware performance events falls below the 1%. The performance loss of the final build attack detection is in the range of 3-4%.
引用
收藏
页码:62 / 74
页数:13
相关论文
共 50 条