Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks

被引:0
|
作者
Townley, Daniel [1 ]
Arikan, Kerem [2 ]
Liu, Yu David [2 ]
Ponomarev, Dmitry [2 ]
Ergin, Oguz [3 ]
机构
[1] Peraton Labs, Bernards, NJ 07920 USA
[2] Binghamton Univ, Binghamton, NY USA
[3] TOBB Univ Econ & Technol, Ankara, Turkey
来源
PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM | 2022年
关键词
HIGH-PERFORMANCE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of isolated execution architectures such as Intel SGX has been significantly threatened by the recent emergence of side-channel attacks. Cache side-channel attacks allow adversaries to leak secrets stored inside isolated enclaves without having direct access to the enclave memory. In some cases, secrets can be leaked even without having the knowledge of the victim application code or having OS-level privileges. We propose the concept of Composable Cachelets (CC), a new scalable strategy to dynamically partition the last-level cache (LLC) for completely isolating enclaves from other applications and from each other. CC supports enclave isolation in caches with the capability to dynamically readjust the cache capacity as enclaves are created and destroyed. We present a cache-aware and enclave-aware operational semantics to help rigorously establish security properties of CC, and we experimentally demonstrate that CC thwarts side-channel attacks on caches with modest performance and complexity impact.
引用
收藏
页码:2839 / 2856
页数:18
相关论文
共 50 条
  • [1] Varys Protecting SGX Enclaves From Practical Side-Channel Attacks
    Oleksenko, Oleksii
    Trach, Bohdan
    Krahn, Robert
    Martin, Andre
    Fetzer, Christof
    Silberstein, Mark
    PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 227 - 239
  • [2] Protecting Shared Virtualized Environments against Cache Side-channel Attacks
    Albalawi, Abdullah
    Vassilakis, Vassilios G.
    Calinescu, Radu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 507 - 514
  • [3] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [4] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [5] Protecting Encrypted Cookies from Compression Side-Channel Attacks
    Alawatugoda, Janaka
    Stebila, Douglas
    Boyd, Colin
    Financial Cryptography and Data Security (FC 2015), 2015, 8975 : 86 - 106
  • [6] Toward an Optimal Countermeasure for Cache Side-Channel Attacks
    Shrivastava, Nivedita
    Sarangi, Smruti R.
    IEEE EMBEDDED SYSTEMS LETTERS, 2023, 15 (03) : 141 - 144
  • [7] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [8] Preventing and Detecting Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis A.
    Kifayat, Kashif
    Hussain, Abir
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [9] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [10] Cache side-channel attacks detection based on machine learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Wang, Zhanpeng
    Wang, Limin
    Zhang, Yusha
    Liu, Yuxin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 920 - 927