We present a kernel-level infrastructure which allows to perform system-wide detection of malicious behavior of applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by common operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. Detection metrics are derived from these measurements, to maximize the likelihood that a malicious application is promptly detected. Our experimental assessment shows that we are able to detect a large family of side-channel attacks with a very reduced overhead in the system. We also discuss countermeasures which can be enacted once a process is suspected to be carrying out a side-channel attack, to increase the overall system’s security level.

Don’t be Paranoid: Dynamic Detection and Mitigation for Threats Exploiting Cache-based Side-channel Attacks / Carna', Stefano; Ferracci, Serena; Quaglia, Francesco; Pellegrini, Alessandro. - (2020), pp. 35-38.

Don’t be Paranoid: Dynamic Detection and Mitigation for Threats Exploiting Cache-based Side-channel Attacks

Stefano Carnà
;
Serena Ferracci;Alessandro Pellegrini
2020

Abstract

We present a kernel-level infrastructure which allows to perform system-wide detection of malicious behavior of applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by common operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. Detection metrics are derived from these measurements, to maximize the likelihood that a malicious application is promptly detected. Our experimental assessment shows that we are able to detect a large family of side-channel attacks with a very reduced overhead in the system. We also discuss countermeasures which can be enacted once a process is suspected to be carrying out a side-channel attack, to increase the overall system’s security level.
2020
ACACES 2020, Poster Abstracts
9789078427001
ACACES; poster session; side-channel attack, detection, mitigation, hardware perfor- mance counters, operating systems
02 Pubblicazione su volume::02a Capitolo o Articolo
Don’t be Paranoid: Dynamic Detection and Mitigation for Threats Exploiting Cache-based Side-channel Attacks / Carna', Stefano; Ferracci, Serena; Quaglia, Francesco; Pellegrini, Alessandro. - (2020), pp. 35-38.
File allegati a questo prodotto
File Dimensione Formato  
Carna_Dont-be-Paranoid_2020.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 219.97 kB
Formato Adobe PDF
219.97 kB Adobe PDF   Contatta l'autore
Carna_Dont-be-Paranoid_2020_Frontespizio-indice.pdf

solo gestori archivio

Tipologia: Altro materiale allegato
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 388.77 kB
Formato Adobe PDF
388.77 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1487750
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact