Guard Cache: Creating Noisy Side-Channels

被引:0
|
作者
Mosquera, Fernando [1 ]
Kavi, Krishna [1 ]
Mehta, Gayatri [2 ]
John, Lizy [3 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76205 USA
[2] Univ North Texas, Dept Elect Engn, Denton, TX 76205 USA
[3] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
关键词
Side-channel attacks; Probes; Technological innovation; Benchmark testing; Out of order; Arrays; Performance gain; Cache side-Channel attacks; evict & time; flush & reload; guard cache; miss cache; obfuscating cache access timing; prime & probe; victim cache; ATTACKS;
D O I
10.1109/LCA.2023.3289710
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Microarchitectural innovations such as deep cache hierarchies, out-of-order execution, branch prediction and speculative execution have made possible the design of processors that meet ever-increasing demands for performance. However, these innovations have inadvertently introduced vulnerabilities, which are exploited by side-channel attacks and attacks relying on speculative executions. Mitigating the attacks while preserving the performance has been a challenge. In this letter we present an approach to obfuscate cache timing, making it more difficult for side-channel attacks to succeed. We create false cache hits using a small Guard Cache with randomization, and false cache misses by randomly evicting cache lines. We show that our false hits and false misses cause very minimal performance penalties and our obfuscation can make it difficult for common side-channel attacks such as Prime & Probe, Flush & Reload or Evict & Time to succeed.
引用
收藏
页码:97 / 100
页数:4
相关论文
共 50 条
  • [1] Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks
    Mosquera, Fernando
    Kavi, Krishna
    Mehta, Gayatri
    John, Lizy K.
    2023 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC, 2023,
  • [2] Risks and Benefits of Side-Channels in Battlefields
    Agadakos, Ioannis
    Ciocarlie, Gabriela F.
    Copos, Bogdan
    Lepoint, Tancrede
    Lindqvist, Ulf
    Locasto, Michael E.
    Michaelis, James R.
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 2290 - 2297
  • [3] BRB: Mitigating Branch Predictor Side-Channels
    Vougioukas, Ilias
    Nikoleris, Nikos
    Sandberg, Andreas
    Diestelhorst, Stephan
    Al-Hashimi, Bashir M.
    Merrett, Geoff V.
    2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2019, : 466 - 477
  • [4] Domain-Agnostic Representation of Side-Channels
    Spence, Aaron
    Bangay, Shaun
    ENTROPY, 2024, 26 (08)
  • [5] Evaluation of (power) side-channels in cryptographic implementations
    Bache, Florian
    Plump, Christina
    Wloka, Jonas
    Gueneysu, Tim
    Drechsler, Rolf
    IT-INFORMATION TECHNOLOGY, 2019, 61 (01): : 15 - 28
  • [6] Bespoke Cache Enclaves: Fine-Grained and Scalable Isolation from Cache Side-Channels via Flexible Set-Partitioning
    Saileshwar, Gururaj
    Kariyappa, Sanjay
    Qureshi, Moinuddin
    2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), 2021, : 37 - 49
  • [7] Capacity of Deliberate Side-Channels Created by Software Activities
    Yilmaz, Baki Berkay
    Prvulovic, Milos
    Zajic, Alenka
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 237 - 242
  • [8] Raccoon: Closing Digital Side-Channels through Obfuscated Execution
    Rane, Ashay
    Lin, Calvin
    Tiwari, Mohit
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 431 - 446
  • [9] Side-Channels Beyond the Cloud Edge : New Isolation Threats and Solutions
    Bazm, Mohammad-Mahdi
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [10] Whispering Devices: A Survey on How Side-channels Lead to Compromised Information
    Corentin Lavaud
    Robin Gerzaguet
    Matthieu Gautier
    Olivier Berder
    Erwan Nogues
    Stephane Molton
    Journal of Hardware and Systems Security, 2021, 5 (2) : 143 - 168