How secure is your cache against side-channel attacks?
Security-critical data can leak through very unexpected side channels, making side-channel attacks very dangerous threats to information security. Of these, cache-based side-channel attacks are some of the most problematic. This is because caches are essential for the performance of modern computers...
Gespeichert in:
| Veröffentlicht in: | MICRO-50 : the 50th annual IEEE/ACM International Symposium on Microarchitecture : proceedings : October 14-18, 2017, Cambridge, MA S. 341 - 353 |
|---|---|
| Hauptverfasser: | , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
New York, NY, USA
ACM
14.10.2017
|
| Schriftenreihe: | ACM Conferences |
| Schlagworte: | |
| ISBN: | 1450349528, 9781450349529 |
| ISSN: | 2379-3155 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Security-critical data can leak through very unexpected side channels, making side-channel attacks very dangerous threats to information security. Of these, cache-based side-channel attacks are some of the most problematic. This is because caches are essential for the performance of modern computers, but an intrinsic property of all caches - the different access times for cache hits and misses - is the property exploited to leak information in time-based cache side-channel attacks. Recently, different secure cache architectures have been proposed to defend against these attacks. However, we do not have a reliable method for evaluating a cache's resilience against different classes of cache side-channel attacks, which is the goal of this paper.
We first propose a novel probabilistic information flow graph (PIFG) to model the interaction between the victim program, the attacker program and the cache architecture. From this model, we derive a new metric, the Probability of Attack Success (PAS), which gives a quantitative measure for evaluating a cache's resilience against a given class of cache side-channel attacks. We show the generality of our model and metric by applying them to evaluate nine different cache architectures against all four classes of cache side-channel attacks. Our new methodology, model and metric can help verify the security provided by different proposed secure cache architectures, and compare them in terms of their resilience to cache side-channel attacks, without the need for simulation or taping out a chip. |
|---|---|
| AbstractList | Security-critical data can leak through very unexpected side channels, making side-channel attacks very dangerous threats to information security. Of these, cache-based side-channel attacks are some of the most problematic. This is because caches are essential for the performance of modern computers, but an intrinsic property of all caches - the different access times for cache hits and misses - is the property exploited to leak information in time-based cache side-channel attacks. Recently, different secure cache architectures have been proposed to defend against these attacks. However, we do not have a reliable method for evaluating a cache's resilience against different classes of cache side-channel attacks, which is the goal of this paper.
We first propose a novel probabilistic information flow graph (PIFG) to model the interaction between the victim program, the attacker program and the cache architecture. From this model, we derive a new metric, the Probability of Attack Success (PAS), which gives a quantitative measure for evaluating a cache's resilience against a given class of cache side-channel attacks. We show the generality of our model and metric by applying them to evaluate nine different cache architectures against all four classes of cache side-channel attacks. Our new methodology, model and metric can help verify the security provided by different proposed secure cache architectures, and compare them in terms of their resilience to cache side-channel attacks, without the need for simulation or taping out a chip. Security-critical data can leak through very unexpected side channels, making side-channel attacks very dangerous threats to information security. Of these, cache-based side-channel attacks are some of the most problematic. This is because caches are essential for the performance of modern computers, but an intrinsic property of all caches - the different access times for cache hits and misses - is the property exploited to leak information in time-based cache side-channel attacks. Recently, different secure cache architectures have been proposed to defend against these attacks. However, we do not have a reliable method for evaluating a cache's resilience against different classes of cache side-channel attacks, which is the goal of this paper.We first propose a novel probabilistic information flow graph (PIFG) to model the interaction between the victim program, the attacker program and the cache architecture. From this model, we derive a new metric, the Probability of Attack Success (PAS), which gives a quantitative measure for evaluating a cache's resilience against a given class of cache side-channel attacks. We show the generality of our model and metric by applying them to evaluate nine different cache architectures against all four classes of cache side-channel attacks. Our new methodology, model and metric can help verify the security provided by different proposed secure cache architectures, and compare them in terms of their resilience to cache side-channel attacks, without the need for simulation or taping out a chip. |
| Author | Lee, Ruby B. He, Zecheng |
| Author_xml | – sequence: 1 givenname: Zecheng surname: He fullname: He, Zecheng email: zechengh@princeton.edu organization: Princeton University – sequence: 2 givenname: Ruby B. surname: Lee fullname: Lee, Ruby B. email: rblee@princeton.edu organization: Princeton University |
| BookMark | eNqNkD1PwzAURc2XRFs6M7B4ZEmx_WzHnhCqgCJVYoHZsp1nGtomKE6F-u8JagdGpivdo3uHMybnTdsgIdeczTiX6g64AAt2NqRUUp-Q8dAykFYJc0pGAkpbAFfq7C-4JNOcPxljgpdWcxgRvWi_aca465DWme7bXUejjyuk_sPXTe5priss4so3DW6o73sf1_n-ilwkv8k4PeaEvD89vs0XxfL1-WX-sCw8cOgLrlkMwqpoKpZsQpAASVYhpMCFESjBWJMwGlVKWwFPRkiZjIqog0m-ggm5OfzWiOi-unrru70z2mity4HODtTHrQttu86OM_erxx31uKMeF7oa0zC4_ecAfgBn4mGr |
| ContentType | Conference Proceeding |
| Copyright | 2017 ACM |
| Copyright_xml | – notice: 2017 ACM |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1145/3123939.3124546 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 1450349528 9781450349529 |
| EISSN | 2379-3155 |
| EndPage | 353 |
| ExternalDocumentID | 8686667 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR ABLEC ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IEGSK OCL RIB RIC RIE RIL AAWTH LHSKQ |
| ID | FETCH-LOGICAL-a313t-160cb295c8d0f9fe3433f4dbbfb1282e43898fec85749d31f8244f85ce6b8fad3 |
| IEDL.DBID | RIE |
| ISBN | 1450349528 9781450349529 |
| ISICitedReferencesCount | 48 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000455679300026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:38:44 EDT 2025 Wed Jan 31 06:40:42 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | cache quantification side-channel attack security modeling |
| Language | English |
| License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org |
| LinkModel | DirectLink |
| MeetingName | MICRO-50: The 50th Annual IEEE/ACM International Symposium on Microarchitecture |
| MergedId | FETCHMERGED-LOGICAL-a313t-160cb295c8d0f9fe3433f4dbbfb1282e43898fec85749d31f8244f85ce6b8fad3 |
| PageCount | 13 |
| ParticipantIDs | acm_books_10_1145_3123939_3124546_brief ieee_primary_8686667 acm_books_10_1145_3123939_3124546 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-10-14 |
| PublicationDateYYYYMMDD | 2017-10-14 |
| PublicationDate_xml | – month: 10 year: 2017 text: 2017-10-14 day: 14 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY, USA |
| PublicationPlace_xml | – name: New York, NY, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | MICRO-50 : the 50th annual IEEE/ACM International Symposium on Microarchitecture : proceedings : October 14-18, 2017, Cambridge, MA |
| PublicationTitleAbbrev | MICRO |
| PublicationYear | 2017 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002179613 ssib030238632 ssib042476800 ssib023363937 |
| Score | 2.3449326 |
| Snippet | Security-critical data can leak through very unexpected side channels, making side-channel attacks very dangerous threats to information security. Of these,... |
| SourceID | ieee acm |
| SourceType | Publisher |
| StartPage | 341 |
| SubjectTerms | Cache Computer architecture Computer systems organization -- Dependable and fault-tolerant systems and networks -- Processors and memory architectures Encryption General and reference -- Cross-computing tools and techniques -- Evaluation Measurement quantification Resilience Security and privacy -- Security in hardware -- Hardware attacks and countermeasures -- Side-channel analysis and countermeasures security modeling side-channel attack Side-channel attacks |
| Title | How secure is your cache against side-channel attacks? |
| URI | https://ieeexplore.ieee.org/document/8686667 |
| WOSCitedRecordID | wos000455679300026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwGP3YhgdP_tjE-YsIghfj2iZNk5MHcew0dlDYraTpFxloJ2un-N-bdN2mIIi3Enoojy99X3689wCuHGNhKBRSKbSgnOuYSpUpqqRkRgQYRNrWYRPJeCynUzVpwc1GC4OI9eUzvPWP9Vl-PjdLv1U2kEK6bjtpQztJxEqrta6diDHBvlGtz8KRYquZ5BF3jXVjRef_0q4VV47KGrefkMcDFno7MOVWsRGPfUPc1ub1R-hKzTnDvf997T70tuI9MtnQ0gG0sDiEvXV6A2kmcxfEaP5BSr_djmRWkk9XVMR4e2ein_XMdY3EJ3lSrwwu8IXoqvJy_LsePA0fHu9HtElRoJqFrKKhCEwWqdjIPLDKIuOMWZ5nmc0cN0Xo48-lRSPjhKuchVY6xrcyNigyaXXOjqBTzAs8BpKjkg4ZZRKFbu5rHaIOElSZVDEKVH24dJClfnlQpivFc5w2sKYNrH24_vOdNFvM0Pah60FN31a2G2mD58nvw6ewG3nG9ZdN-Bl0qsUSz2HHvFezcnFR18oXIbK07A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAFHxoFfRUtYr1cwXBi9Eku9nsnjyIUlGLB4XewmbzVgraSpsq_nv3pakfIIi3sOQQhreZtx8zA3DoGQsjqTFQ0shACJMESuc60EpxK0MMY-OqsIm021W9nr6bg-NPLQwiVpfP8IQeq7P8YmgntFV2qqTy3XY6DwuUnFWrtWbVE3Mu-TeypTQcJb9UkyIWvrWuzejoP-2bce3JrPb7iURyyiMyBNN-HRuLhFrieWOff8SuVKxz2fzf967A-pd8j919EtMqzOFgDZqz_AZWT-cWyM7wjY1pwx1Zf8zefVkxSwbPzDyavu8bGWV5BqQNHuATM2VJgvyzdXi4vLg_7wR1jkJgeMTLIJKhzWOdWFWETjvkgnMnijx3uWenGCkAXTm0KkmFLnjklOd8pxKLMlfOFHwDGoPhADeBFaiVR0bbVKOf_cZEaMIUda50ghJ1Gw48ZBktEMbZVPOcZDWsWQ1rG47-fCfLR310bWgRqNnL1Hgjq_Hc-n14H5Y697c32c1V93oblmPiX7p6InagUY4muAuL9rXsj0d7Vd18AMUMuDU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+50th+Annual+IEEE%2FACM+International+Symposium+on+Microarchitecture&rft.atitle=How+secure+is+your+cache+against+side-channel+attacks%3F&rft.au=He%2C+Zecheng&rft.au=Lee%2C+Ruby+B.&rft.series=ACM+Conferences&rft.date=2017-10-14&rft.pub=ACM&rft.isbn=1450349528&rft.spage=341&rft.epage=353&rft_id=info:doi/10.1145%2F3123939.3124546 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349529/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349529/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349529/sc.gif&client=summon&freeimage=true |

