CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

被引:1
作者
Yang, Chao [1 ]
Guo, Yunfei [1 ]
Hu, Hongchao [1 ]
Liu, Wenyan [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou 450000, Henan, Peoples R China
关键词
Cloud computing; cache-based side-channel attacks; dynamic remapping; cache cleansing; comprehensive defense;
D O I
10.3837/tiis.2018.12.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.
引用
收藏
页码:6098 / 6122
页数:25
相关论文
共 35 条
[1]   Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment [J].
Ainapure, Bharati S. ;
Shah, Deven ;
Rao, A. Ananda .
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 :9-21
[2]  
[Anonymous], HDB RES MOD CRYPT SO
[3]  
[Anonymous], 23 USENIX SEC S
[4]  
[Anonymous], 2018, IEEE T SUSTAINABLE C
[5]  
[Anonymous], VLSI DESIGN IEEE COM
[6]   Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey [J].
Anwar, Shahid ;
Inayat, Zakira ;
Zolkipli, Mohamad Fadli ;
Zain, Jasni Mohamad ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Khan, Muhammad Khurram ;
Chang, Victor .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 93 :259-279
[7]  
Blömer J, 2007, LECT NOTES COMPUT SC, V4876, P96
[8]  
Blömer J, 2005, LECT NOTES COMPUT SC, V3357, P69
[9]   Complementary Dual Codes for Counter-Measures to Side-Channel Attacks [J].
Carlet, Claude ;
Guilley, Sylvain .
CODING THEORY AND APPLICATIONS, 4TH INTERNATIONAL CASTLE MEETING, 2015, 3 :97-105
[10]   Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors [J].
Coppens, Bart ;
Verbauwhede, Ingrid ;
De Bosschere, Koen ;
De Sutter, Bjorn .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :45-+