CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools

被引:3
作者
Zheng, Beilei [1 ]
Gu, Jianan [1 ]
Weng, Chuliang [1 ]
机构
[1] East China Normal Univ, Sch Data Sci & Engn, Shanghai, Peoples R China
来源
ADVANCED PARALLEL PROCESSING TECHNOLOGIES (APPT 2019) | 2019年 / 11719卷
基金
中国国家自然科学基金;
关键词
Cache-based side-channel attacks; Hardware performance counters; Pintools; False positives; SIDE-CHANNEL ATTACKS;
D O I
10.1007/978-3-030-29611-7_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is convenient to provide adequate resources for tenants, but it suffers from information disclosure risks because hardware resources are shared among multiple tenants. For example, secret information in the shared cache can be inferred by other malicious processes, which is called cache-based attacks. To defeat against such attacks, many detection methods have been proposed. However, most of the existing detection mechanisms completely rely on the hardware performance counters (HPCs) and induce high false positives in detecting attacks. This paper proposes an accurate detector named CBA-Detector to detect cache-based side-channel attacks in real time. CBA-Detector is composed of an offline analysis phase and an online detection phase. The former analyzes the hardware events generated by sample programs. Then it extracts features from these events to train machine learning models. Based on the models, the latter monitors active processes in real time to discover suspicious processes. These suspicious processes will be checked again at the instruction level by customized Pintools, which effectively eliminates false positives. As shown in our experiments, CBA-Detector can accurately identify attacks in real time and introduces 4.4% overhead on PARSEC and about 10% overhead on web server.
引用
收藏
页码:109 / 122
页数:14
相关论文
共 17 条
[1]   CacheShield: Detecting Cache Attacks through Self-Observation [J].
Briongos, Samira ;
Irazoqui, Gorka ;
Malagon, Pedro ;
Eisenbarth, Thomas .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :224-235
[2]   Real time detection of cache-based side-channel attacks using hardware performance counters [J].
Chiappetta, Marco ;
Savas, Erkay ;
Yilmaz, Cemal .
APPLIED SOFT COMPUTING, 2016, 49 :1162-1174
[3]  
Das S., 2019, 2019 IEEE S SEC PRIV
[4]  
FEI Y., 2018, PROC IEEEACM ICCAD, P1
[5]  
Gruss Daniel, 2016, Detection of Intrusions and Malware, and Vulnerability Assessment. 13th International Conference, DIMVA 2016. Proceedings: LNCS 9721, P279, DOI 10.1007/978-3-319-40667-1_14
[6]  
Gruss D, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P217
[7]  
Kim T., 2012, 2012 IEEE Power & Energy Society General Meeting. New Energy Horizons - Opportunities and Challenges, DOI 10.1109/PESGM.2012.6345454
[8]  
Kocher P, 2018, Spectre Attacks: Exploiting Speculative Execution
[9]  
Lipp M., 2018, ABS180101207 CORR
[10]  
Liu F, 2016, INT S HIGH PERF COMP, P406, DOI 10.1109/HPCA.2016.7446082