Protecting Shared Virtualized Environments against Cache Side-channel Attacks

被引:0
作者
Albalawi, Abdullah [1 ]
Vassilakis, Vassilios G. [1 ]
Calinescu, Radu [1 ]
机构
[1] Univ York, Dept Comp Sci, York, N Yorkshire, England
来源
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) | 2021年
关键词
Side-channel Attacks; Cache Attacks; Prime plus Probe; Flush plus Reload; Flush plus Flush;
D O I
10.5220/0010897800003120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a side-channel attack detection and protection method that combines dynamic and static analysis. The dynamic analysis uses Linux Perf to obtain readings from 13 hardware performance counters related to the shared cache. Based on these readings, the virtual machine (VM) behaviour is then classified into suspicious or benign using logistic regression classification. As a second step, the static analysis extracts the executable files from the disk image or the RAM image of the suspicious VM. It then checks whether these files contain operating codes for side-channel attacks. Based on this, the threat level of these files is determined using the SoftMax classification algorithm; we have four threat levels in total. After that, VMs that pose a threat to the shared environment are excluded. As a hypervisor, we employed KVM (Kernel-based Virtual Machine), and as guest operating systems, we utilized Linux Ubuntu 18.04.5 LTS (64bits). We then conducted experiments on several host machines, namely Ubuntu 18.04.5 LTS, Debian 10, and CentOS 8, with various processor models. The accuracy of detecting suspicious behaviour and classifying the threat level was recorded as 96%99% with between 0.6%-25% CPU overheads for dynamic and static analysis.
引用
收藏
页码:507 / 514
页数:8
相关论文
共 27 条
[1]  
Akash K, 2018, FLUSH RELOAD ATTACK
[2]   Memory Deduplication as a Protective Factor in Virtualized Systems [J].
Albalawi, Abdullah ;
Vassilakis, Vassilios ;
Calinescu, Radu .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 :301-317
[3]  
[Anonymous], 2019, CORE INSTRUCTIONS
[4]   Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey [J].
Anwar, Shahid ;
Inayat, Zakira ;
Zolkipli, Mohamad Fadli ;
Zain, Jasni Mohamad ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Khan, Muhammad Khurram ;
Chang, Victor .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 93 :259-279
[5]  
Bazm MM, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P7, DOI 10.1109/FMEC.2018.8364038
[6]  
Chiappetta M, 2020, XLATE
[7]   Real time detection of cache-based side-channel attacks using hardware performance counters [J].
Chiappetta, Marco ;
Savas, Erkay ;
Yilmaz, Cemal .
APPLIED SOFT COMPUTING, 2016, 49 :1162-1174
[8]   Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor [J].
Cho, Jonghyeon ;
Kim, Taehun ;
Kim, Soojin ;
Im, Miok ;
Kim, Taehyun ;
Shin, Youngjoo .
APPLIED SCIENCES-BASEL, 2020, 10 (03)
[9]  
Gruss D., 2019, CACHE TEMPLATE ATTAC
[10]  
Gruss D., 2019, FLUSH FLUSH