New Attacks and Defense for Encrypted-Address Cache

Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts. Such attacks can be mitigated by randomizing the location of the lines in the cache. Our recent proposal, CEASER, makes cache randomization prac...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA) S. 360 - 371
1. Verfasser: Qureshi, Moinuddin K.
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: ACM 01.06.2019
Schlagworte:
ISSN:2575-713X
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts. Such attacks can be mitigated by randomizing the location of the lines in the cache. Our recent proposal, CEASER, makes cache randomization practical by accessing the cache using an encrypted address and periodically changing the encryption key. CEASER was analyzed with the state-of-the-art algorithm on forming eviction sets, and the analysis showed that CEASER with a Remap-Rate of 1% is sufficient to tolerate years of attack. In this paper, we present two new attacks that significantly push the state-of-the-art in forming eviction sets. Our first attack reduces the time required to form the eviction set from O (L 2 ) to O(L), where L is the number of lines in the attack. This attack is 35x faster than the best-known attack and requires that the Remap-Rate of CEASER be increased to 35%. Our second attack exploits the replacement policy (we analyze LRU, RRIP, and Random) to form eviction set quickly and requires that the Remap-Rate of CEASER be increased to more than 100%, incurring impractical overheads. To improve the robustness of CEASER against these attacks in a practical manner, we propose Skewed-CEASER (CEASER-S), which divides the cache ways into multiple partitions and maps the cache line to be resident in a different set in each partition. This design significantly improves the robustness of CEASER, as the attacker must form an eviction set that can dislodge the line from multiple possible locations. We show that CEASER-S can tolerate years of attacks while retaining a Remap-Rate of 1%. CEASER-S incurs negligible slowdown (within 1%) and a storage overhead of less than 100 bytes for the newly added structures.
AbstractList Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts. Such attacks can be mitigated by randomizing the location of the lines in the cache. Our recent proposal, CEASER, makes cache randomization practical by accessing the cache using an encrypted address and periodically changing the encryption key. CEASER was analyzed with the state-of-the-art algorithm on forming eviction sets, and the analysis showed that CEASER with a Remap-Rate of 1% is sufficient to tolerate years of attack. In this paper, we present two new attacks that significantly push the state-of-the-art in forming eviction sets. Our first attack reduces the time required to form the eviction set from O (L 2 ) to O(L), where L is the number of lines in the attack. This attack is 35x faster than the best-known attack and requires that the Remap-Rate of CEASER be increased to 35%. Our second attack exploits the replacement policy (we analyze LRU, RRIP, and Random) to form eviction set quickly and requires that the Remap-Rate of CEASER be increased to more than 100%, incurring impractical overheads. To improve the robustness of CEASER against these attacks in a practical manner, we propose Skewed-CEASER (CEASER-S), which divides the cache ways into multiple partitions and maps the cache line to be resident in a different set in each partition. This design significantly improves the robustness of CEASER, as the attacker must form an eviction set that can dislodge the line from multiple possible locations. We show that CEASER-S can tolerate years of attacks while retaining a Remap-Rate of 1%. CEASER-S incurs negligible slowdown (within 1%) and a storage overhead of less than 100 bytes for the newly added structures.
Author Qureshi, Moinuddin K.
Author_xml – sequence: 1
  givenname: Moinuddin K.
  surname: Qureshi
  fullname: Qureshi, Moinuddin K.
  organization: Georgia Institute of Technology
BookMark eNotjstKAzEUhqMo2NZZu3CTF5g2ycl1OYytCkU3Cu5KJjnBeknLZED69gZ09cN_45uTi3zISMgNZ0vOpVoBMKMVWwIIIaQ-I40ztgYMtNZOnpOZUEa1hsPbFWlK-WCMCWt4Lc0IPOEP7abJh89CfY70DhPmgjQdRrrOYTwdJ4xtF-OIpdDeh3e8JpfJfxVs_nVBXjfrl_6h3T7fP_bdtvVCmqmNVnrkUbqBWQ92SENyXkfQtlLqiNoG5QZbMSUEXg0fIPFgFRgZAkNYkNu_3z0i7o7j_tuPp511dSI0_ALmL0X1
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/3307650.3322246
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781450366694
1450366694
EISSN 2575-713X
EndPage 371
ExternalDocumentID 8980326
Genre orig-research
GroupedDBID 23M
29F
29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
ZY4
ID FETCH-LOGICAL-a247t-d84ae1d49b08a38bfbf9a6d3682466de68c59b803643c16deac3f1c85374cc0e3
IEDL.DBID RIE
ISICitedReferencesCount 113
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000521059600028&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 06 17:53:20 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a247t-d84ae1d49b08a38bfbf9a6d3682466de68c59b803643c16deac3f1c85374cc0e3
PageCount 12
ParticipantIDs ieee_primary_8980326
PublicationCentury 2000
PublicationDate 2019-June
PublicationDateYYYYMMDD 2019-06-01
PublicationDate_xml – month: 06
  year: 2019
  text: 2019-June
PublicationDecade 2010
PublicationTitle 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA)
PublicationTitleAbbrev ISCA
PublicationYear 2019
Publisher ACM
Publisher_xml – name: ACM
SSID ssj0002871781
ssj0019956
Score 2.488973
Snippet Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts....
SourceID ieee
SourceType Publisher
StartPage 360
SubjectTerms Coherence
Computer architecture
Encryption
Proposals
Robustness
Title New Attacks and Defense for Encrypted-Address Cache
URI https://ieeexplore.ieee.org/document/8980326
WOSCitedRecordID wos000521059600028&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T0IxFL0B4uCECsbvdHC08Ppa-trRIMTBEAY1bKSvH4nLg-DDxH_vbXmig4tb06kfae85vT3nAtwGDCojKzzVTgoqRIktJgPNmcxDcCz4JI9-fSpmM7VY6HkL7vZaGO99-nzmB7GZcvluZbfxqWyotMoQbrShXRRyp9Xav6dE5J98a5oMQlRsNlY-TIyGSNsLBCMDHjMLEe3-qqWSQsm0-79BHEH_R5NH5vtocwwtX51A97soA2nOaA84Xlvkvq6jdp6YypEHH5CqeoLolEwqu_lcI8ik985Fok3G0dC5Dy_TyfP4kTaVEajJRVFTp4TxzAldZspwVYYyaCMdlwrnJh2urx3pUsUcI7cMO4zlgVkMzYWwNvP8FDrVqvJnQMrgbZ5nTlmRzMM0ggbkZMj6nHHWiHPoxTVYrnfmF8tm-hd_d1_CIW6-3v2luoJOvdn6aziwH_Xb--Ym7dgXZBeU5g
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NTwIxEJ0gmugJFYzf9uDRwu627LZHohCMSDig4Ua6_Ui8LAQXE_-907KiBy_emp627bbzXqfvDcCtw6DS1dxSaVJOOc-xFaeOJnGaOGdiZ4M8-nWUjcdiNpOTGtxttTDW2vD4zLZ9M-TyzUKv_VVZR0gRIdzYgV1fOatSa21vVDz2D841VQ7BazYrM5-YdztI3DOEI23mcwse7_6qphKCyaDxv884hNaPKo9MtvHmCGq2OIbGd1kGUu3SJjA8uEivLL16nqjCkAfrkKxagviU9Au9-lwizKQ9YzzVJvfe0rkFL4P-9H5Iq9oIVCU8K6kRXNnYcJlHQjGRu9xJlRqWChxbanCGdVfmwmcZmY6xQ2nmYo3BOeNaR5adQL1YFPYUSO6sTpLICM2DfZhE2ICsDHmfUUYrfgZNPwfz5cb-Yl4N__zv7hvYH06fR_PR4_jpAg7wV5Cbl1WXUC9Xa3sFe_qjfHtfXYfV-wJanpgv
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+ACM%2FIEEE+46th+Annual+International+Symposium+on+Computer+Architecture+%28ISCA%29&rft.atitle=New+Attacks+and+Defense+for+Encrypted-Address+Cache&rft.au=Qureshi%2C+Moinuddin+K.&rft.date=2019-06-01&rft.pub=ACM&rft.eissn=2575-713X&rft.spage=360&rft.epage=371&rft_id=info:doi/10.1145%2F3307650.3322246&rft.externalDocID=8980326