Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks

被引:2
作者
Wang, Kai [1 ]
Yuan, Fengkai [2 ,3 ]
Zhao, Lutan [2 ,3 ]
Hou, Rui [2 ,3 ]
Ji, Zhenzhou [1 ]
Meng, Dan [2 ,3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Hardware security; Multi-core architectures; Cache side channel attacks; Replacement policies; Randomization;
D O I
10.1016/j.micpro.2021.104420
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Conflict-based attacks on the last-level cache (LLC) are the most threatening cache side channel attack scenarios, where attackers exploit cache set conflicts as a channel to obtain sensitive cache accesses of victims. In this paper, we observe that conflict-based attacks cause exploited cache sets to experience an abnormally large number of accesses. Protecting these sets with suspicious access patterns effectively interferes with the attacker's observation and thus mitigates such attacks. Based on this insight, we propose Secure Hybrid Replacement Policy (SHRP). SHRP captures suspicious sets by counting the number of accesses and alters their replacement policy to introduce noise into the attacker's probe. Specifically, When a request occurs an LLC hit, SHRP has a certain probability of sending an invalidation request to the suspicious set. If a request triggers an LLC replacement, SHRP has a certain probability of turning the request uncacheable. Because of these probabilistic obscuring actions, attackers are impossible to accurately infer the victim's behaviors on the protected cache set. The evaluation demonstrates that SHRP efficiently mitigates conflict-based attacks and induces negligible performance impacts and acceptable storage overhead.
引用
收藏
页数:9
相关论文
共 44 条
  • [21] Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks
    Feng, Yusi
    Zhu, Ziyuan
    Li, Shuan
    Liu, Ben
    Wang, Huozhu
    Meng, Dan
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1132 - 1140
  • [22] Neural Network-Based Side Channel Attacks and Countermeasures
    Serpanos, Dimitrios
    Yang, Shengqi
    Wolf, Marilyn
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [23] A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
    Wu, Chia-Chi
    Kuo, Man-Hsuan
    Lee, Kuen-Jong
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 48 - 53
  • [24] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Mushtaq, Maria
    Yousaf, Muhammad Muneeb
    Bhatti, Muhammad Khurram
    Lapotre, Vianney
    Gogniat, Guy
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 731 - 747
  • [25] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Maria Mushtaq
    Muhammad Muneeb Yousaf
    Muhammad Khurram Bhatti
    Vianney Lapotre
    Guy Gogniat
    Annals of Telecommunications, 2022, 77 : 731 - 747
  • [26] RT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks
    Song, Minkyu
    Lee, Junyeon
    Suh, Taeweon
    Koo, Gunjae
    ELECTRONICS, 2021, 10 (22)
  • [27] Randomization approaches for Secure SAR ADC design resilient against Power Side-Channel Attacks
    Karanth, Sumanth N.
    Oruganti, Sirish
    Wang, Meizhi
    Kulkarni, Jaydeep P.
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 282 - 292
  • [28] Application of Profiled Analysis to ADC -Based Remote Side -Channel Attacks
    Sakamoto, Junichi
    Tachibana, Kazuki
    Matsumoto, Tsutomu
    2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 115 - 121
  • [29] Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
    Dhavlle, Abhijitt
    Mehta, Raj
    Rafatirad, Setareh
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 161 - 166
  • [30] Key Update Countermeasure for Correlation-Based Side-Channel Attacks
    Yutian Gui
    Suyash Mohan Tamore
    Ali Shuja Siddiqui
    Fareena Saqib
    Journal of Hardware and Systems Security, 2020, 4 (3) : 167 - 179