RT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Song, Minkyu | - |
dc.contributor.author | Lee, Junyeon | - |
dc.contributor.author | Suh, Taeweon | - |
dc.contributor.author | Koo, Gunjae | - |
dc.date.accessioned | 2022-02-16T10:42:05Z | - |
dc.date.available | 2022-02-16T10:42:05Z | - |
dc.date.created | 2022-01-19 | - |
dc.date.issued | 2021-11 | - |
dc.identifier.issn | 2079-9292 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/135973 | - |
dc.description.abstract | Since cache side-channel attacks have been serious security threats to multi-tenant systems, there have been several studies to protect systems against the attacks. However, the prior studies have limitations in determining only the existence of the attack and/or occupying too many computing resources in runtime. We propose a low-overhead pinpointing solution, called RT-Sniper, to overcome such limitations. RT-Sniper employs a two-level filtering mechanism to minimize performance overhead. It first monitors hardware events per core and isolates a suspected core to run a malicious process. Then among the processes running on the selected core, RT-Sniper pinpoints a malicious process through a per-process monitoring approach. With the core-level filtering, RT-Sniper has an advantage in overhead compared to the previous works. We evaluate RT-Sniper against Flush+Reload and Prime+Probe attacks running SPEC2017, LMBench, and PARSEC benchmarks on multi-core systems. Our evaluation demonstrates that the performance overhead by RT-Sniper is negligible (0.3% for single-threaded applications and 2.05% for multi-threaded applications). Compared to the previous defense solutions against cache side-channel attacks, RT-Sniper exhibits better detection performance with lower performance overhead. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.title | RT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Suh, Taeweon | - |
dc.contributor.affiliatedAuthor | Koo, Gunjae | - |
dc.identifier.doi | 10.3390/electronics10222748 | - |
dc.identifier.scopusid | 2-s2.0-85118697674 | - |
dc.identifier.wosid | 000725155600001 | - |
dc.identifier.bibliographicCitation | ELECTRONICS, v.10, no.22 | - |
dc.relation.isPartOf | ELECTRONICS | - |
dc.citation.title | ELECTRONICS | - |
dc.citation.volume | 10 | - |
dc.citation.number | 22 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordAuthor | cache side-channel attacks | - |
dc.subject.keywordAuthor | malware detection | - |
dc.subject.keywordAuthor | overhead | - |
dc.subject.keywordAuthor | security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.