MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks

被引:1
|
作者
Yang, Chao [1 ]
Guo, Yunfei [1 ]
Hu, Hongchao [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou 450000, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Cache-based side-channel attack; hypervisor-based defense; memory dynamic remapping;
D O I
10.1109/ACCESS.2018.2886372
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current countermeasures against last level cache (LLC) based non-memory-sharing side-channel attacks (LNSA), which is a powerful and practical cache attack in the cloud, fail in practical due to their shortage of generality or efficiency. Motivated by random cache access, we propose a novel defense method called dynamic remapping which dynamically changes mapping relationship from virtual memory to cache at hypervisor layer. It aims to confuse the attacker about the relationship between observed cache activities and values of demanded secret. In order to guarantee scalability and deployability, we formalize the problem of remapping, and design a sequential classified selection algorithm to decide how to remap all those protected memory. Furthermore, we implement MemWander, a prototype system integrated in Xen and OpenStack which are popular cloud settings. And its security improvement and performance overhead are evaluated on various applications and an apache server as a simulated cloud service. The experimental results show that MemWander not only provides enough security guarantees for general services in cloud, but also induces low performance overhead as no more than 7%, which is tolerable in most scenarios.
引用
收藏
页码:2179 / 2199
页数:21
相关论文
共 50 条
  • [1] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [2] Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks
    Wang, Han
    Hafiz, Syed Mahbub
    Patwari, Kartik
    Chuah, Chen-Nee
    Shafiq, Zubair
    Homayoun, Houman
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 1515 - 1520
  • [3] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [4] CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks
    Yang, Chao
    Guo, Yunfei
    Hu, Hongchao
    Liu, Wenyan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (12): : 6098 - 6122
  • [5] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170
  • [6] FLUSH plus PREFETCH: A countermeasure against access-driven cache-based side-channel attacks
    Mukhtar, M. Asim
    Mushtaq, Maria
    Bhatti, M. Khurram
    Lapotre, Vianney
    Gogniat, Guy
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 104
  • [7] Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
    Mushtaq, Maria
    Mukhtar, Muhammad Asim
    Lapotre, Vianney
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    INFORMATION SYSTEMS, 2020, 92
  • [8] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Atici, Ali Can
    Yilmaz, Cemal
    Savas, Erkay
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84
  • [9] Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters
    Bazm, Mohammad-Mahdi
    Sautereau, Thibaut
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 7 - 12
  • [10] Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures
    Su, Chao
    Zeng, Qingkai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021