首页> 外文会议>Annual International Symposium on Computer Architecture >TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
【24h】

TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks

机译:TimeWarp:重新思考的计时和性能监测机制,以减轻方向渠攻击

获取原文

摘要

Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on fixing the source of leaks either by limiting the flow of information through the side channel by modifying hardware, or by refactoring vulnerable software to protect sensitive data from leaking. These solutions are reactive and not preventative: while the modifications may protect against a single attack, they do nothing to prevent future side channel attacks that exploit other microarchitectural side channels or exploit the same side channel in a novel way. In this paper we present a general mitigation strategy that focuses on the infrastructure used to measure side channel leaks rather than the source of leaks, and thus applies to all known and unknown microarchitectural side channel leaks. Our approach is to limit the fidelity of fine grain timekeeping and performance counters, making it difficult for an attacker to distinguish between different microarchitectural events, thus thwarting attacks. We demonstrate the strength of our proposed security modifications, and validate that our changes do not break existing software. Our proposed changes require minor - or in some cases, no - hardware modifications and do not result in any substantial performance degradation, yet offer the most comprehensive protection against microarchitectural side channels to date.
机译:在过去的二十年中,已经利用了几个微体系结构侧渠道以创造复杂的安全攻击。解决这个问题的解决方案主要集中在通过修改硬件来限制通过侧信道的信息流程来修复泄漏源,或者通过重构易受攻击的软件来保护敏感数据泄漏来保护敏感的数据。这些解决方案是无限的,而不是预防性:虽然修改可以防止单一攻击,但它们无所作为无法以一种新颖的方式利用其他微体系结构侧通道或利用同一侧通道的未来侧通道攻击。在本文中,我们提出了一项一般的缓解策略,专注于用于测量侧通道泄漏而不是泄漏来源的基础设施,因此适用于所有已知的和未知的微体系结构侧通道泄漏。我们的方法是限制精细谷物计时和性能计数器的保真度,使攻击者难以区分不同的微体系结构,从而挫败攻击。我们展示了我们提出的安全修改的实力,并验证了我们的更改不会破坏现有软件。我们所提出的变化需要轻微的 - 或在某些情况下,无硬件修改,并不会导致任何实质性的性能退化,但迄今为止提供对微体建筑侧渠道的最全面的保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号