SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks

被引:0
|
作者
Tang, Bowen [1 ,2 ]
Wu, Chenggang [1 ,2 ,3 ]
Yew, Pen-Chung [4 ]
Zhang, Yinqian [5 ]
Xie, Mengyao [1 ,2 ]
Lai, Yuanming [1 ,2 ]
Kang, Yan [1 ,2 ]
Wang, Wei [1 ,2 ]
Wei, Qiang [6 ]
Wang, Zhe [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, SKLP, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
[4] Univ Minnesota, Comp Sci & Engn Dept, Minneapolis, MN 55455 USA
[5] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen 518055, Peoples R China
[6] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Resource contention; scheduling strategy; simultaneous multithreading (SMT); transient execution attack (TEA);
D O I
10.1109/TCAD.2023.3284290
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Transient execution attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and transmit them through timing-based covert channels. While new vulnerabilities are discovered continuously, the covert channels can be categorized to two types: 1) Persistent Type, in which covert channels are based on the layout changes of buffering, e.g., through caches or TLBs and 2) Volatile Type, in which covert channels are based on the contention of sharing resources, e.g., through execution units or issuing ports. The defenses against the persistent-type covert channels have been well addressed, while those for the volatile-type are still rather inadequate. Existing mitigation schemes for the volatile type such as Speculative Compression and Time-Division-Multiplexing will introduce significant overhead due to the need to stall the pipeline or to disallow resource sharing. In this article, we look into such attacks and defenses with a new perspective, and propose a scheduling-based mitigation scheme, called SpecWands. It consists of three priority-based scheduling policies to prevent an attacker from transmitting the secret in different contention situations. SpecWands not only can defend against both interthread and intrathread-based attacks but also can keep most of the performance benefit from speculative execution and resource-sharing. We evaluate its runtime overhead on SPEC 2017 benchmarks and realistic programs. The experimental results show that SpecWands has a significant performance advantage over the other two representative schemes.
引用
收藏
页码:4477 / 4490
页数:14
相关论文
共 50 条
  • [21] Efficient File Dissemination in Data Center Networks With Priority-Based Adaptive Multicast
    Luo, Shouxi
    Yu, Hongfang
    Li, Ke
    Xing, Huanlai
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1161 - 1175
  • [22] PriNergy: a priority-based energy-efficient routing method for IoT systems
    Fatemeh Safara
    Alireza Souri
    Thar Baker
    Ismaeel Al Ridhawi
    Moayad Aloqaily
    The Journal of Supercomputing, 2020, 76 : 8609 - 8626
  • [23] An Energy Efficient Priority-based QoS MAC Protocol for Wireless Sensor Networks
    Ben-Othman, Jalel
    Mokdad, Lynda
    Yahya, Bashir
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [24] An efficient priority-based dynamic channel allocation strategy for mobile cellular networks
    Dong, XF
    Lai, TH
    IEEE INFOCOM '97 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, PROCEEDINGS, VOLS 1-3: SIXTEENTH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS SOCIETIES - DRIVING THE INFORMATION REVOLUTION, 1997, : 892 - 899
  • [25] Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing
    Yin, Jiaying
    Fu, Jing
    Wu, Jingjin
    Zheng, Shiming
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT I, 2022, 13155 : 564 - 577
  • [26] PriNergy: a priority-based energy-efficient routing method for IoT systems
    Safara, Fatemeh
    Souri, Alireza
    Baker, Thar
    Al Ridhawi, Ismaeel
    Aloqaily, Moayad
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (11): : 8609 - 8626
  • [27] An Energy Efficient Priority based Wireless Multimedia Sensor Node Dynamic Scheduler
    Jamshed, Muhammad Ali
    Khan, Muhammad Farhan
    Rafique, Khalid
    Khan, Muhammad Imran
    Faheem, Kashif
    Shah, Syed Muslim
    Rahim, Anum
    2015 12TH INTERNATIONAL CONFERENCE ON HIGH-CAPACITY OPTICAL NETWORKS AND ENABLING/EMERGING TECHNOLOGIES (HONET), 2015, : 147 - 150
  • [28] Priority-Based Buffer Management Technique Against Dropping Attack in Opportunistic Networks
    Srivastav, Satyendra Kumar
    Tripathi, M. M.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 153 - 163
  • [29] PATM: Priority-based Adaptive Topology Management for efficient routing in ad hoc networks
    Tan, HX
    Zeng, WL
    Bao, LC
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 2, 2005, 3515 : 485 - 492
  • [30] Efficient Workflow Scheduling Algorithm for Cloud Computing System: A Dynamic Priority-Based Approach
    Indrajeet Gupta
    Madhu Sudan Kumar
    Prasanta K. Jana
    Arabian Journal for Science and Engineering, 2018, 43 : 7945 - 7960