Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini
{"title":"用硬件对抗硬件:利用性能计数器在全系统范围内检测和缓解侧信道攻击","authors":"Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini","doi":"arxiv-2402.13281","DOIUrl":null,"url":null,"abstract":"We present a kernel-level infrastructure that allows system-wide detection of\nmalicious applications attempting to exploit cache-based side-channel attacks\nto break the process confinement enforced by standard operating systems. This\ninfrastructure relies on hardware performance counters to collect information\nat runtime from all applications running on the machine. High-level detection\nmetrics are derived from these measurements to maximize the likelihood of\npromptly detecting a malicious application. Our experimental assessment shows\nthat we can catch a large family of side-channel attacks with a significantly\nreduced overhead. We also discuss countermeasures that can be enacted once a\nprocess is suspected of carrying out a side-channel attack to increase the\noverall tradeoff between the system's security level and the delivered\nperformance under non-suspected process executions.","PeriodicalId":501333,"journal":{"name":"arXiv - CS - Operating Systems","volume":"167 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fight Hardware with Hardware: System-wide Detection and Mitigation of Side-Channel Attacks using Performance Counters\",\"authors\":\"Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini\",\"doi\":\"arxiv-2402.13281\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a kernel-level infrastructure that allows system-wide detection of\\nmalicious applications attempting to exploit cache-based side-channel attacks\\nto break the process confinement enforced by standard operating systems. This\\ninfrastructure relies on hardware performance counters to collect information\\nat runtime from all applications running on the machine. High-level detection\\nmetrics are derived from these measurements to maximize the likelihood of\\npromptly detecting a malicious application. Our experimental assessment shows\\nthat we can catch a large family of side-channel attacks with a significantly\\nreduced overhead. We also discuss countermeasures that can be enacted once a\\nprocess is suspected of carrying out a side-channel attack to increase the\\noverall tradeoff between the system's security level and the delivered\\nperformance under non-suspected process executions.\",\"PeriodicalId\":501333,\"journal\":{\"name\":\"arXiv - CS - Operating Systems\",\"volume\":\"167 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Operating Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2402.13281\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Operating Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2402.13281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fight Hardware with Hardware: System-wide Detection and Mitigation of Side-Channel Attacks using Performance Counters
We present a kernel-level infrastructure that allows system-wide detection of
malicious applications attempting to exploit cache-based side-channel attacks
to break the process confinement enforced by standard operating systems. This
infrastructure relies on hardware performance counters to collect information
at runtime from all applications running on the machine. High-level detection
metrics are derived from these measurements to maximize the likelihood of
promptly detecting a malicious application. Our experimental assessment shows
that we can catch a large family of side-channel attacks with a significantly
reduced overhead. We also discuss countermeasures that can be enacted once a
process is suspected of carrying out a side-channel attack to increase the
overall tradeoff between the system's security level and the delivered
performance under non-suspected process executions.