Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

RT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks

Full metadata record
DC Field Value Language
dc.contributor.authorSong, Minkyu-
dc.contributor.authorLee, Junyeon-
dc.contributor.authorSuh, Taeweon-
dc.contributor.authorKoo, Gunjae-
dc.date.accessioned2022-02-16T10:42:05Z-
dc.date.available2022-02-16T10:42:05Z-
dc.date.created2022-01-19-
dc.date.issued2021-11-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/135973-
dc.description.abstractSince cache side-channel attacks have been serious security threats to multi-tenant systems, there have been several studies to protect systems against the attacks. However, the prior studies have limitations in determining only the existence of the attack and/or occupying too many computing resources in runtime. We propose a low-overhead pinpointing solution, called RT-Sniper, to overcome such limitations. RT-Sniper employs a two-level filtering mechanism to minimize performance overhead. It first monitors hardware events per core and isolates a suspected core to run a malicious process. Then among the processes running on the selected core, RT-Sniper pinpoints a malicious process through a per-process monitoring approach. With the core-level filtering, RT-Sniper has an advantage in overhead compared to the previous works. We evaluate RT-Sniper against Flush+Reload and Prime+Probe attacks running SPEC2017, LMBench, and PARSEC benchmarks on multi-core systems. Our evaluation demonstrates that the performance overhead by RT-Sniper is negligible (0.3% for single-threaded applications and 2.05% for multi-threaded applications). Compared to the previous defense solutions against cache side-channel attacks, RT-Sniper exhibits better detection performance with lower performance overhead.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titleRT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks-
dc.typeArticle-
dc.contributor.affiliatedAuthorSuh, Taeweon-
dc.contributor.affiliatedAuthorKoo, Gunjae-
dc.identifier.doi10.3390/electronics10222748-
dc.identifier.scopusid2-s2.0-85118697674-
dc.identifier.wosid000725155600001-
dc.identifier.bibliographicCitationELECTRONICS, v.10, no.22-
dc.relation.isPartOfELECTRONICS-
dc.citation.titleELECTRONICS-
dc.citation.volume10-
dc.citation.number22-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorcache side-channel attacks-
dc.subject.keywordAuthormalware detection-
dc.subject.keywordAuthoroverhead-
dc.subject.keywordAuthorsecurity-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Suh, Tae weon photo

Suh, Tae weon
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE