The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection

被引:0
作者
Maria Mushtaq
Muhammad Muneeb Yousaf
Muhammad Khurram Bhatti
Vianney Lapotre
Guy Gogniat
机构
[1] Institute Polytechnique de Paris,LTCI, Télécom Paris
[2] Information Technology University,Lab
[3] Universite Bretagne Sud,STICC
来源
Annals of Telecommunications | 2022年 / 77卷
关键词
Hardware security; Linux; Intel x86; Side-channel attacks; Cryptanalysis; Detection; Mitigation; Machine learning; RSA; AES; Flush+Reload; Flush+Flush; Prime+Probe;
D O I
暂无
中图分类号
学科分类号
摘要
Most of the mitigation techniques against access-driven cache side-channel attacks (CSCAs) are not very effective. This is mainly because most mitigation techniques usually protect against any given specific vulnerability of the system and do not take a system-wide approach. Moreover, they either completely remove or greatly reduce the performance benefits. Therefore, to find a security vs performance trade-off, we argue in favor of need-based protection in this paper, which will allow the operating system to apply mitigation only after successful detection of CSCAs. Thus, detection can serve as a first line of defense against such attacks. In this work, we propose a novel OS-level runtime detection-based mitigation mechanism, called the Kingsguard, against CSCAs in general-purpose operating systems. The proposed mechanism enhances the security and privacy capabilities of Linux as a proof of concept, and it can be widely used in commodity systems without any hardware modifications. We provide experimental validation by mitigating three state-of-the-art CSCAs on two different cryptosystems running under Linux. We have also provided results by analyzing the effect of the combination of multiple attacks running concurrently under variable system noise. Our results show that the Kingsguard can detect and mitigate known CSCAs with an accuracy of more than 99% and 95%, respectively.
引用
收藏
页码:731 / 747
页数:16
相关论文
共 24 条
[1]  
Akram A(2020)Meet the Sherlock Holmes’ of side channel leakage: a survey of cache sca detection techniques IEEE Access 8 70,836-70,860
[2]  
Mushtaq M(2016)Real time detection of cache-based side-channel attacks using hardware performance counters Appl Soft Comput 49 1162-1174
[3]  
Bhatti M(2020)Whisper: a tool for run-time detection of side-channel attacks IEEE Access 8 83,871-83,900
[4]  
Lapotre V(2010)Efficient Cache Attacks on AES, and Countermeasures J Cryptol 23 37-71
[5]  
Gogniat G(2015)On mitigating the risk of cross-vm covert channels in a public cloud IEEE Trans Parallel Distrib Syst 26 2327-2339
[6]  
Chiappetta M(undefined)undefined undefined undefined undefined-undefined
[7]  
Savas E(undefined)undefined undefined undefined undefined-undefined
[8]  
Yilmaz C(undefined)undefined undefined undefined undefined-undefined
[9]  
Mushtaq M(undefined)undefined undefined undefined undefined-undefined
[10]  
Bricq J(undefined)undefined undefined undefined undefined-undefined