ACPC: Covert Channel Attack on Last Level Cache using Dynamic Cache Partitioning

Jaspinder Kaur, Shirshendu Das
{"title":"ACPC: Covert Channel Attack on Last Level Cache using Dynamic Cache Partitioning","authors":"Jaspinder Kaur, Shirshendu Das","doi":"10.1109/ISQED57927.2023.10129363","DOIUrl":null,"url":null,"abstract":"The Last Level Cache (LLC) of modern multicore processors is normally shared between different cores and applications. Dynamic cache partitioning is applied to the LLC for fairly distributing the LLC space among the applications. Recently, Covert Channel Attacks (CCA) becomes a major security issue for modern multicore systems. In CCA, two malicious applications: spy and Trojan, run in two different cores. Trojan normally runs in a secure core and knows some secret information. Through CCA, Trojan communicates this information to the spy. A well-known technique to perform such an attack is Prime Probe (P+P). It performs the attack by using the shared behavior of LLC space. Cache partitioning is considered a defense against such CCA. Partitioning makes the applications isolated in the LLC and they cannot evict each other block from the LLC. Hence, the existing P+P based attacks are not possible while dynamic partitioning is applied to LLC. However, in this work, we have proposed a modified CCA (based on P+P) which can establish a covert channel on top of the dynamic cache partitioning technique applied to LLC. Such kinds of attacks must need to be handled carefully in modern processors. A possible defense mechanism for the new attack is also discussed in this paper.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 24th International Symposium on Quality Electronic Design (ISQED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISQED57927.2023.10129363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Last Level Cache (LLC) of modern multicore processors is normally shared between different cores and applications. Dynamic cache partitioning is applied to the LLC for fairly distributing the LLC space among the applications. Recently, Covert Channel Attacks (CCA) becomes a major security issue for modern multicore systems. In CCA, two malicious applications: spy and Trojan, run in two different cores. Trojan normally runs in a secure core and knows some secret information. Through CCA, Trojan communicates this information to the spy. A well-known technique to perform such an attack is Prime Probe (P+P). It performs the attack by using the shared behavior of LLC space. Cache partitioning is considered a defense against such CCA. Partitioning makes the applications isolated in the LLC and they cannot evict each other block from the LLC. Hence, the existing P+P based attacks are not possible while dynamic partitioning is applied to LLC. However, in this work, we have proposed a modified CCA (based on P+P) which can establish a covert channel on top of the dynamic cache partitioning technique applied to LLC. Such kinds of attacks must need to be handled carefully in modern processors. A possible defense mechanism for the new attack is also discussed in this paper.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ACPC:使用动态缓存分区对最后一级缓存的隐蔽通道攻击
现代多核处理器的最后一级缓存(LLC)通常在不同的核心和应用程序之间共享。为了在应用程序之间公平地分配LLC空间,对LLC应用了动态缓存分区。近年来,隐蔽通道攻击(CCA)成为现代多核系统的主要安全问题。在CCA中,两个恶意应用程序:间谍和特洛伊木马,在两个不同的内核中运行。木马通常运行在一个安全的核心,并知道一些秘密信息。通过CCA,特洛伊木马将此信息传达给间谍。执行这种攻击的一种众所周知的技术是Prime Probe (P+P)。利用LLC空间的共享行为进行攻击。缓存分区被认为是对这种CCA的一种防御。分区使得应用程序隔离在LLC中,它们不能从LLC中驱逐彼此的块。因此,当动态分区应用于LLC时,现有的基于P+P的攻击是不可能的。然而,在这项工作中,我们提出了一种改进的CCA(基于P+P),它可以在应用于LLC的动态缓存分区技术之上建立隐蔽通道。这种攻击必须在现代处理器中谨慎处理。本文还讨论了一种可能的防御机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Metal Inter-layer Via Keep-out-zone in M3D IC: A Critical Process-aware Design Consideration HD2FPGA: Automated Framework for Accelerating Hyperdimensional Computing on FPGAs A Novel Stochastic LSTM Model Inspired by Quantum Machine Learning DC-Model: A New Method for Assisting the Analog Circuit Optimization Polynomial Formal Verification of a Processor: A RISC-V Case Study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1