The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection

被引:4
作者
Mushtaq, Maria [1 ]
Yousaf, Muhammad Muneeb [2 ]
Bhatti, Muhammad Khurram [2 ]
Lapotre, Vianney [3 ]
Gogniat, Guy [3 ]
机构
[1] Inst Polytech Paris, Telecom Paris, LTCI, Palaiseau, France
[2] Informat Technol Univ, Lahore, Pakistan
[3] Univ Bretagne Sud, Lab STICC, Lorient, France
关键词
Hardware security; Linux; Intel x86; Side-channel attacks; Cryptanalysis; Detection; Mitigation; Machine learning; RSA; AES; Flush plus Reload; Flush plus Flush; Prime plus Probe;
D O I
10.1007/s12243-021-00906-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of the mitigation techniques against access-driven cache side-channel attacks (CSCAs) are not very effective. This is mainly because most mitigation techniques usually protect against any given specific vulnerability of the system and do not take a system-wide approach. Moreover, they either completely remove or greatly reduce the performance benefits. Therefore, to find a security vs performance trade-off, we argue in favor of need-based protection in this paper, which will allow the operating system to apply mitigation only after successful detection of CSCAs. Thus, detection can serve as a first line of defense against such attacks. In this work, we propose a novel OS-level runtime detection-based mitigation mechanism, called the Kingsguard, against CSCAs in general-purpose operating systems. The proposed mechanism enhances the security and privacy capabilities of Linux as a proof of concept, and it can be widely used in commodity systems without any hardware modifications. We provide experimental validation by mitigating three state-of-the-art CSCAs on two different cryptosystems running under Linux. We have also provided results by analyzing the effect of the combination of multiple attacks running concurrently under variable system noise. Our results show that the Kingsguard can detect and mitigate known CSCAs with an accuracy of more than 99% and 95%, respectively.
引用
收藏
页码:731 / 747
页数:17
相关论文
共 38 条
[1]  
Aciiçmez O, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P11
[2]   Meet the Sherlock Holmes' of Side Channel Leakage: A Survey of Cache SCA Detection Techniques [J].
Akram, Ayaz ;
Mushtaq, Maria ;
Bhatti, Muhammad Khurram ;
Lapotre, Vianney ;
Gogniat, Guy .
IEEE ACCESS, 2020, 8 :70836-70860
[3]  
[Anonymous], 2017, P UK WORKSH COMP INT
[4]  
[Anonymous], 2017, IACR Cryptology ePrint Archive
[5]  
[Anonymous], 2018, PERFORMANCE APPL PRO
[6]  
[Anonymous], 2012, P ACM C COMP COMM SE, DOI DOI 10.1145/2382196.2382230
[7]   Predictive Black-Box Mitigation of Timing Channels [J].
Askarov, Aslan ;
Zhang, Danfeng ;
Myers, Andrew C. .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :297-307
[8]  
Bazm MM, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P7, DOI 10.1109/FMEC.2018.8364038
[9]   CacheShield: Detecting Cache Attacks through Self-Observation [J].
Briongos, Samira ;
Irazoqui, Gorka ;
Malagon, Pedro ;
Eisenbarth, Thomas .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :224-235
[10]   Real time detection of cache-based side-channel attacks using hardware performance counters [J].
Chiappetta, Marco ;
Savas, Erkay ;
Yilmaz, Cemal .
APPLIED SOFT COMPUTING, 2016, 49 :1162-1174