Skip to main content

2018 | OriginalPaper | Buchkapitel

Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment

verfasst von : Bharati S. Ainapure, Deven Shah, A. Ananda Rao

Erschienen in: Progress in Intelligent Computing Techniques: Theory, Practice, and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multitenancy is the biggest advantage of computing, where physical resources are shared among multiple clients. Virtualization facilitates multitenancy with the help of the hypervisor. Cloud providers virtualize the resources like CPU, network interfaces, peripherals, hard drives, and memory using hypervisor. In a virtualization environment, many virtual machines (VMs) can run on the same core with the help of the hypervisor by sharing the resources. The virtual machines (VMs) running on the same core are the target for the malicious or abnormal attacks like side-channel attacks. Cache-based attack in the cloud is one of the side-channel attacks. Cache is one of the resources shared among different VMs on the same core. The attacker can make use cache behavior and can perform the cache-based side-channel attack on the victim. In this paper, we explore different types of cache designs, categories of cache-based side-channel attacks and existing detection and mitigation techniques for cache-based side-channel attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in CCS, 2009, pp. 199–212. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in CCS, 2009, pp. 199–212.
2.
Zurück zum Zitat Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China. Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China.
3.
Zurück zum Zitat A. Shamir, E. Tramer. Acoustic cryptanalysis: on nosy people and noisy machines. Eurocrypt 2004 rump session, 2004. A. Shamir, E. Tramer. Acoustic cryptanalysis: on nosy people and noisy machines. Eurocrypt 2004 rump session, 2004.
4.
Zurück zum Zitat Deepa G M et al, “An overview of acoustic side channel attack”, International Journal of Computer Science & Communication Networks, Vol 3(1), 15–20. Deepa G M et al, “An overview of acoustic side channel attack”, International Journal of Computer Science & Communication Networks, Vol 3(1), 15–20.
5.
Zurück zum Zitat Godfrey, M., Zulkernine, M., “Preventing cache based side channel attacks in a cloud environment”, IEEE Transactions on Cloud Computing, Volume: 2, Issue: 4, Oct.-Dec. 1 2014. Godfrey, M., Zulkernine, M., “Preventing cache based side channel attacks in a cloud environment”, IEEE Transactions on Cloud Computing, Volume: 2, Issue: 4, Oct.-Dec. 1 2014.
6.
Zurück zum Zitat Acıiçmez, O., Brumley, B. & Grabher, P., 2010. New results on instruction cache attacks. In CHES’10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems. Acıiçmez, O., Brumley, B. & Grabher, P., 2010. New results on instruction cache attacks. In CHES’10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems.
7.
Zurück zum Zitat Yuval Yarom, Katrina Falkner “FLUSH + RELOAD: a High Resolution Low noise, L3 cache Side-Channel attack”, 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 719–732. Yuval Yarom, Katrina Falkner “FLUSH + RELOAD: a High Resolution Low noise, L3 cache Side-Channel attack”, 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 719–732.
8.
Zurück zum Zitat Osvik, D., Shamir, A. & Tromer, E., 2006. Cache attacks and countermeasures: the case of AES. In Topics in Cryptology–CT-RSA 2006. pp. 1–25. Osvik, D., Shamir, A. & Tromer, E., 2006. Cache attacks and countermeasures: the case of AES. In Topics in Cryptology–CT-RSA 2006. pp. 1–25.
9.
Zurück zum Zitat Liu, F. & Lee, R.B., 2013. Security testing of a secure cache design. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP’13. New York, New. Liu, F. & Lee, R.B., 2013. Security testing of a secure cache design. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP’13. New York, New.
10.
Zurück zum Zitat Raphael Spreitzer, Benoıt Gerard, “Towards More Practical Time-Driven Cache Attacks” WISTP 2014, LNCS 8501, pp. 24–39, 2014. Raphael Spreitzer, Benoıt Gerard, “Towards More Practical Time-Driven Cache Attacks” WISTP 2014, LNCS 8501, pp. 24–39, 2014.
11.
Zurück zum Zitat K. Tiri, O. Acıic¸mez, M. Neve, and F. Andersen, “An analytical model for time-driven cache attacks,” in FSE’07, ser. LNCS, A. Biryukov, Ed., vol. 4593. Springer, 2007, pp. 399–413. K. Tiri, O. Acıic¸mez, M. Neve, and F. Andersen, “An analytical model for time-driven cache attacks,” in FSE’07, ser. LNCS, A. Biryukov, Ed., vol. 4593. Springer, 2007, pp. 399–413.
13.
Zurück zum Zitat Fei Liu, Lanfang Ren, Hongatao Bai, “Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform”, i-scholar, Journals of computers, Vol. 9 2014, Published: 2014-04-01, pp: 1005–1013. Fei Liu, Lanfang Ren, Hongatao Bai, “Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform”, i-scholar, Journals of computers, Vol. 9 2014, Published: 2014-04-01, pp: 1005–1013.
14.
Zurück zum Zitat Z. Wu, Z. Xu, and H. Wang, “Whispers in the hyper-space: High-speed covert channel attacks in the cloud,” in USENIX Security, 2012, pp. 9–9. Z. Wu, Z. Xu, and H. Wang, “Whispers in the hyper-space: High-speed covert channel attacks in the cloud,” in USENIX Security, 2012, pp. 9–9.
15.
Zurück zum Zitat Si Yu, Xiaolin Gui, Jiancai Lin, “An approach with two stage mode to detect cache based side channel attack”, IEEE Computer Society Washington, DC, USA ©2013. Si Yu, Xiaolin Gui, Jiancai Lin, “An approach with two stage mode to detect cache based side channel attack”, IEEE Computer Society Washington, DC, USA ©2013.
16.
Zurück zum Zitat M. Chiappetta, E. Savas, and C. Yilmaz, “Real time detection of cachebased side-channel attacks using hardware performance counters,” Cryptology ePrint Archive, Report 2015/1034, 2015, http://eprint.iacr.org/. M. Chiappetta, E. Savas, and C. Yilmaz, “Real time detection of cachebased side-channel attacks using hardware performance counters,” Cryptology ePrint Archive, Report 2015/1034, 2015, http://​eprint.​iacr.​org/​.
17.
Zurück zum Zitat Rui Zhang, Xiaojun Su & et al, “On mitigating the Risk of Cross-VM Covert Channel in Public Cloud:”, Parallel and Distributed Systems, IEEE Transactions on (Volume:26, Issue: 8), Date of Current Version: 13 July 2015 Page(s): 2327–2339. Rui Zhang, Xiaojun Su & et al, “On mitigating the Risk of Cross-VM Covert Channel in Public Cloud:”, Parallel and Distributed Systems, IEEE Transactions on (Volume:26, Issue: 8), Date of Current Version: 13 July 2015 Page(s): 2327–2339.
18.
Zurück zum Zitat Fei Liu, Lanfang Ren, Hongatao Bai, “Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform”, i-scholar, Journals of computers, Vol. 9 2014, Published: 2014-04-01Pages: 1005–1013. Fei Liu, Lanfang Ren, Hongatao Bai, “Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform”, i-scholar, Journals of computers, Vol. 9 2014, Published: 2014-04-01Pages: 1005–1013.
19.
Zurück zum Zitat Deian Stefan, Pablo Buiras, & et al. “Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling”, 18th European Symposium on Research in Computer Security, Egham, UK, September 9–13, 2013. Proceedings, Publisher Springer Berlin Heidelberg. Deian Stefan, Pablo Buiras, & et al. “Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling”, 18th European Symposium on Research in Computer Security, Egham, UK, September 9–13, 2013. Proceedings, Publisher Springer Berlin Heidelberg.
20.
Zurück zum Zitat Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz, “STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud”, Security’12 Proceedings of the 21st USENIX conference on Security symposium” ACM, 2012. Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz, “STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud”, Security’12 Proceedings of the 21st USENIX conference on Security symposium” ACM, 2012.
21.
Zurück zum Zitat Godfrey Zulkernine M, “Preventing Cache-Based Side-Channel Attacks in a Cloud Environment”, Cloud Computing, IEEE Transactions on (Volume:2, Issue: 4), Issue Date: Oct.-Dec. 1 2014, Page(s): 395–408. Godfrey Zulkernine M, “Preventing Cache-Based Side-Channel Attacks in a Cloud Environment”, Cloud Computing, IEEE Transactions on (Volume:2, Issue: 4), Issue Date: Oct.-Dec. 1 2014, Page(s): 395–408.
22.
Zurück zum Zitat Jicheng Shi, Xiang Song, Haibo Chen, Binyu Zang “Limiting cache based side channel in multi-tenant cloud using dynamic page colouring”, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W). Jicheng Shi, Xiang Song, Haibo Chen, Binyu Zang “Limiting cache based side channel in multi-tenant cloud using dynamic page colouring”, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
Metadaten
Titel
Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment
verfasst von
Bharati S. Ainapure
Deven Shah
A. Ananda Rao
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3376-6_2