SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks

被引:0
|
作者
Tang, Bowen [1 ,2 ]
Wu, Chenggang [1 ,2 ,3 ]
Yew, Pen-Chung [4 ]
Zhang, Yinqian [5 ]
Xie, Mengyao [1 ,2 ]
Lai, Yuanming [1 ,2 ]
Kang, Yan [1 ,2 ]
Wang, Wei [1 ,2 ]
Wei, Qiang [6 ]
Wang, Zhe [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, SKLP, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
[4] Univ Minnesota, Comp Sci & Engn Dept, Minneapolis, MN 55455 USA
[5] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen 518055, Peoples R China
[6] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Resource contention; scheduling strategy; simultaneous multithreading (SMT); transient execution attack (TEA);
D O I
10.1109/TCAD.2023.3284290
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Transient execution attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and transmit them through timing-based covert channels. While new vulnerabilities are discovered continuously, the covert channels can be categorized to two types: 1) Persistent Type, in which covert channels are based on the layout changes of buffering, e.g., through caches or TLBs and 2) Volatile Type, in which covert channels are based on the contention of sharing resources, e.g., through execution units or issuing ports. The defenses against the persistent-type covert channels have been well addressed, while those for the volatile-type are still rather inadequate. Existing mitigation schemes for the volatile type such as Speculative Compression and Time-Division-Multiplexing will introduce significant overhead due to the need to stall the pipeline or to disallow resource sharing. In this article, we look into such attacks and defenses with a new perspective, and propose a scheduling-based mitigation scheme, called SpecWands. It consists of three priority-based scheduling policies to prevent an attacker from transmitting the secret in different contention situations. SpecWands not only can defend against both interthread and intrathread-based attacks but also can keep most of the performance benefit from speculative execution and resource-sharing. We evaluate its runtime overhead on SPEC 2017 benchmarks and realistic programs. The experimental results show that SpecWands has a significant performance advantage over the other two representative schemes.
引用
收藏
页码:4477 / 4490
页数:14
相关论文
共 50 条
  • [1] Priority-based lambda scheduler
    Ganesan, K
    Ramamurthy, B
    2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 1479 - 1483
  • [2] PBS: A Unified Priority-Based Scheduler
    Feng, Hanhua
    Misra, Vishal
    Rubenstein, Dan
    SIGMETRICS'07: PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2007, 35 (01): : 203 - +
  • [3] A priority-based MLFQ scheduler for CPU power saving
    Kashif, Muhammad
    Helmy, Tarek
    El-Sebakhy, Emad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 130 - +
  • [4] A Priority-Based Budget Scheduler with Conservative Dataflow Model
    Steine, Marcel
    Bekooij, Marco
    Wiggers, Maarten
    PROCEEDINGS OF THE 2009 12TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, ARCHITECTURES, METHODS AND TOOLS, 2009, : 37 - +
  • [5] A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs
    Almalkawi I.T.
    Raed J.
    Alsarhan A.
    Abdallah A.E.
    Abdallah E.E.
    International Journal of Interactive Mobile Technologies, 2021, 15 (03): : 43 - 69
  • [6] Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation
    Khanna, Kush
    Panigrahi, Bijaya Ketan
    Joshi, Anupam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1945 - 1952
  • [7] Integrating Priority with Share in the Priority-Based Weighted Fair Queuing Scheduler for Real-Time Networks
    Song Wang
    Yu-Chung Wang
    Kwei-Jay Lin
    Real-Time Systems, 2002, 22 : 119 - 149
  • [8] Priority-based Contention Period Allocation for Directional CSMA/CA in Smart Home
    Kim, Yongsun
    Kang, Hoyong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [9] Integrating priority with share in the priority-based weighted fair queuing scheduler for real-time networks
    Wang, S
    Wang, YC
    Lin, KJ
    REAL-TIME SYSTEMS, 2002, 22 (1-2) : 119 - 149
  • [10] On stable and efficient mechanisms for priority-based allocation problems
    Rong, Kang
    Tang, Qianfeng
    Zhang, Yongchao
    JOURNAL OF ECONOMIC THEORY, 2020, 187