论文标题
管道调音器:使用自动卡鸡蛋过滤器缓解跨核缓存攻击
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter
论文作者
论文摘要
缓存侧通道攻击获得受害者缓存线访问足迹以推断至关重要的信息。其中,利用共享最后一个级别缓存的跨核攻击更具威胁性,因为它们的设置和高容量的简单性。基于检测的缓解措施的状态方法可观察到精确的缓存行为,并保护怀疑受到攻击的特定缓存线。但是,它们的记录结构在开销上产生了大型存储空间,并且容易受到反向工程攻击的影响。本文探索了传统的杜鹃滤波器的内在非确定布局,提出了一个有效的空间自动卡鸡蛋过滤器,以记录访问足迹,从而成功地降低了存储开销并抵抗逆向工程攻击。使用自动cuckoo滤波器,我们建议Pipomonitor检测\ textit {ping-pong patters}和预取特定的高速缓存线以干扰对手的高速缓存探针。安全分析表明,管道调音器可以有效地减轻跨核攻击,并且自动cuckoo滤波器不受反向工程攻击的影响。评估结果表明,管家对性能的影响可以忽略不计,而存储开销仅为0.37 $ \%$,比以前的状态方法低的命令级。
Cache side channel attacks obtain victim cache line access footprint to infer security-critical information. Among them, cross-core attacks exploiting the shared last level cache are more threatening as their simplicity to set up and high capacity. Stateful approaches of detection-based mitigation observe precise cache behaviors and protect specific cache lines that are suspected of being attacked. However, their recording structures incur large storage overhead and are vulnerable to reverse engineering attacks. Exploring the intrinsic non-determinate layout of a traditional Cuckoo filter, this paper proposes a space efficient Auto-Cuckoo filter to record access footprints, which succeed to decrease storage overhead and resist reverse engineering attacks at the same time. With Auto-Cuckoo filter, we propose PiPoMonitor to detect \textit{Ping-Pong patterns} and prefetch specific cache line to interfere with adversaries' cache probes. Security analysis shows the PiPoMonitor can effectively mitigate cross-core attacks and the Auto-Cuckoo filter is immune to reverse engineering attacks. Evaluation results indicate PiPoMonitor has negligible impact on performance and the storage overhead is only 0.37$\%$, an order of magnitude lower than previous stateful approaches.