Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks

被引:2
作者
Wang, Kai [1 ]
Yuan, Fengkai [2 ,3 ]
Zhao, Lutan [2 ,3 ]
Hou, Rui [2 ,3 ]
Ji, Zhenzhou [1 ]
Meng, Dan [2 ,3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Hardware security; Multi-core architectures; Cache side channel attacks; Replacement policies; Randomization;
D O I
10.1016/j.micpro.2021.104420
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Conflict-based attacks on the last-level cache (LLC) are the most threatening cache side channel attack scenarios, where attackers exploit cache set conflicts as a channel to obtain sensitive cache accesses of victims. In this paper, we observe that conflict-based attacks cause exploited cache sets to experience an abnormally large number of accesses. Protecting these sets with suspicious access patterns effectively interferes with the attacker's observation and thus mitigates such attacks. Based on this insight, we propose Secure Hybrid Replacement Policy (SHRP). SHRP captures suspicious sets by counting the number of accesses and alters their replacement policy to introduce noise into the attacker's probe. Specifically, When a request occurs an LLC hit, SHRP has a certain probability of sending an invalidation request to the suspicious set. If a request triggers an LLC replacement, SHRP has a certain probability of turning the request uncacheable. Because of these probabilistic obscuring actions, attackers are impossible to accurately infer the victim's behaviors on the protected cache set. The evaluation demonstrates that SHRP efficiently mitigates conflict-based attacks and induces negligible performance impacts and acceptable storage overhead.
引用
收藏
页数:9
相关论文
共 44 条
  • [31] Cache Side-Channel Attacks and Time-Predictability in High-Performance Critical Real-Time Systems
    Trilla, David
    Hernandez, Carles
    Abella, Jaume
    Cazorla, Francisco J.
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [32] Partial Scan Design Against Scan-based Side Channel Attacks
    Chen, Xi
    Lu, Zhaojun
    Qu, Gang
    Cui, Aijiao
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1484 - 1489
  • [33] REVOLVER: A Zero-Step Execution Emulation Framework for Mitigating Power Side-Channel Attacks on ARM64
    Zonios, Christos
    Tenentes, Vasileios
    2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022), 2022,
  • [34] REDCAP: Reconfigurable RFET-based Circuits Against Power Side-Channel Attacks
    Kavand, Nima
    Darjani, Armin
    Galderisi, Giulio
    Trommert, Jens
    Mikolajick, Thomas
    Kumar, Akash
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [35] Prefender: A <underline>Pref</underline>etching Def<underline>en</underline>der Against Cache Side Channel Attacks as a Preten<underline>der</underline>
    Li, Luyi
    Huang, Jiayi
    Feng, Lang
    Wang, Zhongfeng
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (06) : 1457 - 1471
  • [36] RFET-based Dynamic Differential Logic Cells Against Power Side-Channel Attacks
    Kavand, Nima
    Darjani, Armin
    Chhabra, Garvit
    Kumar, Akash
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 136 - 142
  • [37] Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe)
    Bhade, Pavitra
    Paturel, Joseph
    Sentieys, Olivier
    Sinha, Sharad
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (04)
  • [38] Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware
    Ali, Usman
    Sahni, Sheikh Abdul Rasheed
    Khan, Omer
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (03)
  • [39] Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture
    Wang, Weizheng
    Wang, Xiangqi
    Wang, Jin
    Xiong, Neal N.
    Cai, Shuo
    Liu, Peng
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (03): : 2009 - 2023
  • [40] Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling
    Hoang, Van-Phuc
    Do, Ngoc-Tuan
    Doan, Van Sang
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (03) : 1187 - 1196