Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini
{"title":"Fight Hardware with Hardware: System-wide Detection and Mitigation of Side-Channel Attacks using Performance Counters","authors":"Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini","doi":"arxiv-2402.13281","DOIUrl":null,"url":null,"abstract":"We present a kernel-level infrastructure that allows system-wide detection of\nmalicious applications attempting to exploit cache-based side-channel attacks\nto break the process confinement enforced by standard operating systems. This\ninfrastructure relies on hardware performance counters to collect information\nat runtime from all applications running on the machine. High-level detection\nmetrics are derived from these measurements to maximize the likelihood of\npromptly detecting a malicious application. Our experimental assessment shows\nthat we can catch a large family of side-channel attacks with a significantly\nreduced overhead. We also discuss countermeasures that can be enacted once a\nprocess is suspected of carrying out a side-channel attack to increase the\noverall tradeoff between the system's security level and the delivered\nperformance under non-suspected process executions.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"167 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Operating Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2402.13281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We present a kernel-level infrastructure that allows system-wide detection of
malicious applications attempting to exploit cache-based side-channel attacks
to break the process confinement enforced by standard operating systems. This
infrastructure relies on hardware performance counters to collect information
at runtime from all applications running on the machine. High-level detection
metrics are derived from these measurements to maximize the likelihood of
promptly detecting a malicious application. Our experimental assessment shows
that we can catch a large family of side-channel attacks with a significantly
reduced overhead. We also discuss countermeasures that can be enacted once a
process is suspected of carrying out a side-channel attack to increase the
overall tradeoff between the system's security level and the delivered
performance under non-suspected process executions.