Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks

被引:2
作者
Wang, Kai [1 ]
Yuan, Fengkai [2 ,3 ]
Zhao, Lutan [2 ,3 ]
Hou, Rui [2 ,3 ]
Ji, Zhenzhou [1 ]
Meng, Dan [2 ,3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Hardware security; Multi-core architectures; Cache side channel attacks; Replacement policies; Randomization;
D O I
10.1016/j.micpro.2021.104420
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Conflict-based attacks on the last-level cache (LLC) are the most threatening cache side channel attack scenarios, where attackers exploit cache set conflicts as a channel to obtain sensitive cache accesses of victims. In this paper, we observe that conflict-based attacks cause exploited cache sets to experience an abnormally large number of accesses. Protecting these sets with suspicious access patterns effectively interferes with the attacker's observation and thus mitigates such attacks. Based on this insight, we propose Secure Hybrid Replacement Policy (SHRP). SHRP captures suspicious sets by counting the number of accesses and alters their replacement policy to introduce noise into the attacker's probe. Specifically, When a request occurs an LLC hit, SHRP has a certain probability of sending an invalidation request to the suspicious set. If a request triggers an LLC replacement, SHRP has a certain probability of turning the request uncacheable. Because of these probabilistic obscuring actions, attackers are impossible to accurately infer the victim's behaviors on the protected cache set. The evaluation demonstrates that SHRP efficiently mitigates conflict-based attacks and induces negligible performance impacts and acceptable storage overhead.
引用
收藏
页数:9
相关论文
共 44 条
  • [1] One more set: Mitigating conflict-based cache side-channel attacks by extending cache set
    Gu, Yuzhe
    Tang, Ming
    Wang, Quancheng
    Wang, Han
    Ding, Haili
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [2] RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping
    Zhang, Xingjian
    Gong, Haochen
    Chang, Rui
    Zhou, Yajin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3758 - 3771
  • [3] Seeds of SEED: H2Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks
    Zhang, Xingjian
    Yuan, Ziqi
    Chang, Rui
    Zhou, Yajin
    2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), 2021, : 29 - 36
  • [4] Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis
    Wang, Han
    Sayadi, Hossein
    Mohsenin, Tinoosh
    Zhao, Liang
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 1414 - 1419
  • [5] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [6] TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer
    Wang, Mingyu
    Jia, Shijie
    Zheng, Fangyu
    Ma, Yuan
    Lin, Jingqiang
    Meng, Lingjia
    Ma, Ziqiang
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [7] Dynamic First Access Isolation Cache to Eliminate Reuse-Based Cache Side Channel Attacks
    Wang, Chong
    Yu, Hong
    Wei, Shuai
    Song, Ke
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (02)
  • [8] Toward an Optimal Countermeasure for Cache Side-Channel Attacks
    Shrivastava, Nivedita
    Sarangi, Smruti R.
    IEEE EMBEDDED SYSTEMS LETTERS, 2023, 15 (03) : 141 - 144
  • [9] PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender
    Li, Luyi
    Huang, Jiayi
    Feng, Lang
    Wang, Zhongfeng
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 1509 - 1514
  • [10] Guard Cache: Creating False Cache Hits and Misses To Mitigate Side-Channel Attacks
    Mosquera, Fernando
    Kavi, Krishna
    Mehta, Gayatri
    John, Lizy K.
    2023 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC, 2023,