Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks

Full metadata record
DC Field Value Language
dc.contributor.authorShin, Youngjoo-
dc.contributor.authorYun, Joobeom-
dc.date.accessioned2022-03-12T07:41:06Z-
dc.date.available2022-03-12T07:41:06Z-
dc.date.created2022-01-20-
dc.date.issued2021-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/138702-
dc.description.abstractCrypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where inevitable cache contention among different tenants occurs. Previous approaches for mitigating cache side-channel attacks have limitations in terms of the deployability and security; these hinder utilization in cloud services. In this paper, we propose an R2-relocator, a novel library protection technique based on moving target defence. When injected into a running process, the R2-relocator performs randomized relocation of the library during runtime. By doing this, it transforms a vulnerable crypto library into one that randomly changes its memory (cache) location, thereby preventing the delivery of cache side-channel attacks against the library. The proposed technique achieves robust protection against cache side-channel attacks for all crypto libraries, even those containing unpatched critical vulnerabilities, without the need for reconfiguration of the library. Extensive evaluations of security, performance, and deployability of the R2-relocator demonstrate its effectiveness for secure cloud services.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleRuntime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks-
dc.typeArticle-
dc.contributor.affiliatedAuthorShin, Youngjoo-
dc.identifier.doi10.1109/ACCESS.2021.3101638-
dc.identifier.scopusid2-s2.0-85111574479-
dc.identifier.wosid000683996600001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.9, pp.108851 - 108860-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume9-
dc.citation.startPage108851-
dc.citation.endPage108860-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorCache side-channel attack-
dc.subject.keywordAuthorCloud computing-
dc.subject.keywordAuthorComputer bugs-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorLibraries-
dc.subject.keywordAuthorRuntime-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorSide-channel attacks-
dc.subject.keywordAuthorattack mitigation-
dc.subject.keywordAuthorcrypto library-
dc.subject.keywordAuthormoving target defence-
dc.subject.keywordAuthorsecure cloud computing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE