Download PDFOpen PDF in browser

Locality Based Cache Side-channel Attack Detection

17 pagesPublished: October 3, 2022

Abstract

Cryptographic algorithms are fundamental to security. However, it has been shown that secret information could be effectively extracted through monitoring and analyzing the cache side-channel information (i.e., hit and miss) of cryptographic implementations. To mitigate such attacks, a large number of detection-based defenses have been proposed. To the best of our knowledge, almost all of them are achieved by collecting and analyzing hardware performance counter (HPC) data. But these low-level HPC data usually lacks semantic information and is easy to be interfered, which makes it difficult to determine the attack type by analyzing the HPC information only.
Actually, the behavior of a cache attack is localized. In certain attack-related steps, the data accesses of cache memory blocks are intensive, while such behavior can be distributed sparsely among different attack steps. Based on this observation, in this paper, we pro- pose the locality-based cache side-channel attack detection method, which combines the low-level HPC running data with the high-level control flow graph (CFG) of the program to achieve locality-guided attack pattern extraction. Then we can use GNN graph clas- sification technology to learn such attack pattern and detect malicious attack programs. The experiments with a corpus of 1200 benchmarks show that our approach can achieve 99.44% accuracy and 99.47% F1-Score with a low performance overhead.

Keyphrases: Detection based defenses, high-level information, locality, side-channel attacks

In: Ulrich Kühne and Fan Zhang (editors). Proceedings of 10th International Workshop on Security Proofs for Embedded Systems, vol 87, pages 49--65

Links:
BibTeX entry
@inproceedings{PROOFS2021:Locality_Based_Cache_Side_channel,
  author    = {Limin Wang and Lei Bu and Fu Song},
  title     = {Locality Based Cache Side-channel Attack Detection},
  booktitle = {Proceedings of 10th International Workshop on Security Proofs for Embedded Systems},
  editor    = {Ulrich K\textbackslash{}"uhne and Fan Zhang},
  series    = {EPiC Series in Computing},
  volume    = {87},
  pages     = {49--65},
  year      = {2022},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {https://easychair.org/publications/paper/mMlH},
  doi       = {10.29007/vbqt}}
Download PDFOpen PDF in browser