2019 International Conference on Information and Communication Technology Convergence (ICTC) 2019
DOI: 10.1109/ictc46691.2019.8939797
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…The main side effects of cache SCA are related to the use of caches and small loops. These effects increase several stats such as cache misses [21,23], cache hits [21], cache accesses [21], number of executed instructions [21], number of CPU clock cycles [21], speculative branches taken [23], retired branches [23]. The side effects observed values will be different for each architecture.…”
Section: Memory Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…The main side effects of cache SCA are related to the use of caches and small loops. These effects increase several stats such as cache misses [21,23], cache hits [21], cache accesses [21], number of executed instructions [21], number of CPU clock cycles [21], speculative branches taken [23], retired branches [23]. The side effects observed values will be different for each architecture.…”
Section: Memory Attacksmentioning
confidence: 99%
“…The detection method used by the mechanisms might not rely on a single value, but rather on side effect waveforms throughout the attack. Complex techniques involving neural networks are now being used to detect side effects, such as in [21], [23], and [79]. For example, cache hits or cache accesses do not provide enough information to identify a malicious process, and instead, the designer must use a combination of cache side effects to come to a decision.…”
Section: Side Effect Criteriamentioning
confidence: 99%
See 1 more Smart Citation
“…Their monitor uses the HPCs to gather the necessary information to train the machine learning classifier. Chiappetta et al [2] and Cho et al [3] use the HPCs and machine learning to detect Cache Side-Channel attacks (CacheCSA). Chiappetta et al implement a detection mechanism that could be run in user space, read the HPCs and feed the data in a classifier to decide for the existence of CacheCSA.…”
Section: Related Workmentioning
confidence: 99%
“…To address SATHV researchers proposed online detection mechanisms [1]- [3] that utilize Hardware Performance Counters (HPCs). HPCs are special-purpose registers integrated in most modern architectures.…”
Section: Introductionmentioning
confidence: 99%