CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds

被引:151
作者
Zhang, Tianwei [1 ]
Zhang, Yinqian [2 ]
Lee, Ruby B. [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
[2] Ohio State Univ, Columbus, OH 43210 USA
来源
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2016 | 2016年 / 9854卷
基金
美国国家科学基金会;
关键词
Attack detection; Side-channel attacks; Performance counters; Cloud computing; Mitigation;
D O I
10.1007/978-3-319-45719-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present CloudRadar, a system to detect, and hence mitigate, cache-based side-channel attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it exploits signature-based detection to identify when the protected virtual machine (VM) executes a cryptographic application; at the same time, it uses anomaly-based detection techniques to monitor the co-located VMs to identify abnormal cache behaviors that are typical during cache-based side-channel attacks. We show that correlation in the occurrence of these two events offer strong evidence of side-channel attacks. Compared to other work on side-channel defenses, CloudRadar has the following advantages: first, CloudRadar focuses on the root causes of cachebased side-channel attacks and hence is hard to evade using metamorphic attack code, while maintaining a low false positive rate. Second, CloudRadar is designed as a lightweight patch to existing cloud systems, which does not require new hardware support, or any hypervisor, operating system, application modifications. Third, CloudRadar provides real-time protection and can detect side-channel attacks within the order of milliseconds. We demonstrate a prototype implementation of CloudRadar in the OpenStack cloud framework. Our evaluation suggests CloudRadar achieves negligible performance overhead with high detection accuracy.
引用
收藏
页码:118 / 140
页数:23
相关论文
共 47 条
[1]  
[Anonymous], STREAM: Sustainable memory bandwidth in high performance computers
[2]  
[Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
[3]  
[Anonymous], 2012, P 2012 INT C DEPENDA, DOI DOI 10.1109/DSN.2012.6263958
[4]  
Azar Y., 2014, ACM WORKSH CLOUD COM
[5]  
Bahador M., 2014, IEEE INT C COMP KNOW
[6]  
Barr Jeff, 2015, Cloud Computing, Server Utilization, & the Environment
[7]  
Chiappetta Marco, 2015, 20151034 CRYPT EPRIN
[8]  
Demme J., 2013, ACM INT S COMP ARCH
[9]   Non-Monopolizable Caches: Low-Complexity Mitigation of Cache Side Channel Attacks [J].
Domnitser, Leonid ;
Jaleel, Aamer ;
Loew, Jason ;
Abu-Ghazaleh, Nael ;
Ponomarev, Dmitry .
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2012, 8 (04)
[10]  
Duda RO., 1973, PATTERN CLASSIFICATI