2023
DOI: 10.1145/3519601
|View full text |Cite
|
Sign up to set email alerts
|

Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters

Abstract: We present a kernel-level infrastructure that allows system-wide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. High-level detection metrics are derived from these measurements to maximize the likelihood of promptly detecting a malicious application. Our exp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 50 publications
0
8
0
Order By: Relevance
“…Hardware introspection capabilities provided by HPCs are suitable to address multiple security challenges, 46,47 ranging from the identification of return‐oriented programming attacks 48 to the detection of several exploits of side‐channel vulnerabilities 49,50 . Furthermore, the design of countermeasures for new transient execution vulnerabilities 51 present in most processors required new strategies featured by hardware instrumentation 52,53 to observe the stealth activities performed by attackers, also in a system‐wide fashion 4 . All these works highlight the relevance of PMUs as a support for the online profiling of applications.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Hardware introspection capabilities provided by HPCs are suitable to address multiple security challenges, 46,47 ranging from the identification of return‐oriented programming attacks 48 to the detection of several exploits of side‐channel vulnerabilities 49,50 . Furthermore, the design of countermeasures for new transient execution vulnerabilities 51 present in most processors required new strategies featured by hardware instrumentation 52,53 to observe the stealth activities performed by attackers, also in a system‐wide fashion 4 . All these works highlight the relevance of PMUs as a support for the online profiling of applications.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, perf contains an anti‐trashing detector that reduces the profiling frequency rate if the interrupt routine experiences a delay over a defined threshold. However, this mechanism introduces a degree of indeterminism that cannot be easily quantified and that, depending on the objective for which PMU data are used, may be unacceptable—like for the case of security based on the hardware footprint left by the running software 4 …”
Section: Experimental Assessmentmentioning
confidence: 99%
See 3 more Smart Citations