skip to main content
10.1145/3196494.3196501acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper
Public Access

Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses

Published:29 May 2018Publication History

ABSTRACT

A program's use of CPU caches may reveal its memory access pattern and thus leak sensitive information when the program performs secret-dependent memory accesses. In recent studies, it has been demonstrated that cache side-channel attacks that extract secrets by observing the victim program's cache uses can be conducted under a variety of scenarios, among which the most concerning are cross-VM attacks and those against SGX enclaves. In this paper, we propose a mechanism that leverages hardware transactional memory (HTM) to enable software programs to defend themselves against various cache side-channel attacks. We observe that when the HTM is implemented by retrofitting cache coherence protocols, as is the case of Intel's Transactional Synchronization Extensions, the cache interference that is necessary in cache side-channel attacks will inevitably terminate hardware transactions. We provide a systematic analysis of the security requirements that a software-only solution must meet to defeat cache attacks, propose a software design that leverages HTM to satisfy these requirements and devise several optimization techniques in our implementation to reduce performance impact caused by transaction aborts. The empirical evaluation suggests that the performance overhead caused by the HTM-based solution is low.

References

  1. Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar. 2014. Fine grain Cross-VM attacks on Xen and VMware are possible! Cryptology ePrint Archive.Google ScholarGoogle Scholar
  2. Daniel J. Bernstein. 2005. Cache-timing attacks on AES. Technical Report.Google ScholarGoogle Scholar
  3. Joseph Bonneau and Ilya Mironov. 2006. Cache-Collision timing attacks against AES. In Proceedings of Cryptographic Hardware and Embedded Systems (CHES'06). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Intel Corporation. 2014. Intel 64 and IA-32 Architectures Software Developer's Manual, Combined Volumes: 1, 2A, 2B, 2C, 3A, 3B and 3C. (2014).Google ScholarGoogle Scholar
  5. Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, and Michael Franz. 2015. Thwarting cache side-channel attacks through dynamic software diversity ISOC Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  6. The Apache Software Foundation. 2017. ApacheBench: Apache HTTP server benchmarking tool. (2017).Google ScholarGoogle Scholar
  7. Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory 26th USENIX Security Symposium.Google ScholarGoogle Scholar
  8. David Gullasch, Endre Bangerter, and Stephan Krenn. 2011. Cache games -- bringing access-based cache attacks on AES to practice 32nd IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar. 2015. S$A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES. In 36th IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz. 2012. STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud 21st USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fangfei Liu, Qian Ge, Yuval Yarom, Frank Mckeen, Carlos Rozas, Gernot Heiser, and Ruby B. Lee. 2016. CATalyst: Defeating last-level cache side channel attacks in cloud computing 22nd IEEE Symposium on High Performance Computer Architecture.Google ScholarGoogle Scholar
  12. Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. 2015. Last-level cache side-channel attacks are practical 36th IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang, and Haibo Chen. 2014. Concurrent and consistent virtual machine introspection with hardware transactional memory. In 20th International Symposium on High Performance Computer Architecture.Google ScholarGoogle ScholarCross RefCross Ref
  14. David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2005. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In 8th International Conference on Information Security and Cryptology. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. David Mosberger and Tai Jin. 1998. Httperf -- A tool for measuring web server performance. ACM SIGMETRICS Performance Evaluation Review (1998). Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications Security
    May 2018
    866 pages
    ISBN:9781450355766
    DOI:10.1145/3196494

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 May 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    ASIACCS '18 Paper Acceptance Rate52of310submissions,17%Overall Acceptance Rate418of2,322submissions,18%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader