Skip to main content

Detecting Time-Fragmented Cache Attacks Against AES Using Performance Monitoring Counters

  • Conference paper
  • First Online:
Cloud Computing and Big Data (JCC&BD 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1050))

Included in the following conference series:

Abstract

Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral effects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc countermeasures can be applied only when such a risky situation arises. In our case, the victim process is the Advanced Encryption Standard (AES) encryption algorithm and the attack is performed by means of random encryption requests. We demonstrate that PMCs are a feasible tool to detect the attack and that sampling PMCs at high frequencies is worse than sampling at lower frequencies in terms of detection capabilities, particularly when the attack is fragmented in time to try to be hidden from detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A cache line – 64 bytes in our target architecture – can store 16 elements of a table, provided each element is stored as a 4-byte unsigned integer.

References

  1. Specification for the advanced encryption standard (AES). Federal Information Processing Standards Publication 197 (2001). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  2. Biswas, A.K., Ghosal, D., Nagaraja, S.: A survey of timing channels and countermeasures. ACM Comput. Surv. 50(1), 1–39 (2017). https://doi.org/10.1145/3023872

    Article  Google Scholar 

  3. Briongos, S., Irazoqui, G., Malagón, P., Eisenbarth, T.: CacheShield: detecting cache attacks through self-observation. In: CODASPY, pp. 224–235 (2018). https://doi.org/10.1145/3176258.3176320

  4. Briongos, S., Malagón, P., de Goyeneche, J.M., Moya, J.: Cache misses and the recovery of the full AES 256 key. Appl. Sci. 9(5), 944 (2019). https://doi.org/10.3390/app9050944

    Article  Google Scholar 

  5. Canella, C., et al.: A systematic evaluation of transient execution attacks and defenses (2018). http://arxiv.org/abs/1811.05441

  6. Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. Appl. Soft Comput. J. 49, 1162–1174 (2016). https://doi.org/10.1016/j.asoc.2016.09.014

    Article  Google Scholar 

  7. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002). https://doi.org/10.1007/978-3-662-04722-4

    Book  MATH  Google Scholar 

  8. Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 8(1), 1–27 (2018). https://doi.org/10.1007/s13389-016-0141-6

    Article  Google Scholar 

  9. Horn, J.: Project zero - reading privileged memory with a side-channel (2018). https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

  10. Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Wait a minute! A fast, cross-VM attack on AES. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 299–319. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11379-1_15

    Chapter  Google Scholar 

  11. Kumar, A., et al.: Future Intel Xeon Scalable Processors. Hotchips (2018)

    Google Scholar 

  12. Lyu, Y., Mishra, P.: A survey of side-channel attacks on caches and countermeasures. J. Hardw. Syst. Secur. 2(1), 33–50 (2017). https://doi.org/10.1007/s41635-017-0025-y

    Article  Google Scholar 

  13. Nguyen, K.T.: Introduction to Cache Allocation Technology in the Intel® Xeon® Processor E5 v4 Family (2016). https://software.intel.com/en-us/articles/introduction-to-cache-allocation-technology

  14. Terpstra, D., Jagode, H., You, H., Dongarra, J.: Collecting performance data with PAPI-C. In: Müller, M., Resch, M., Schulz, A., Nagel, W. (eds.) Tools for High Performance Computing 2009, pp. 157–173. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11261-4_11

    Chapter  Google Scholar 

  15. Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Conference on Security Symposium, pp. 719–732 (2014)

    Google Scholar 

  16. Zhang, T., Zhang, Y., Lee, R.B.: CloudRadar: a real-time side-channel attack detection system in clouds. In: Monrose, F., Dacier, M., Blanc, G., Garcia-Alfaro, J. (eds.) RAID 2016. LNCS, vol. 9854, pp. 118–140. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45719-2_6

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by the EU FEDER and the Spanish MINECO under grant number TIN2015-65277-R and by Spanish CM under grant S2018/TCS-4423. We would like to thank Samira Briongos and Pedro Malagón for their helpful comments on some details of the attack implementation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iván Prada .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prada, I., Igual, F.D., Olcoz, K. (2019). Detecting Time-Fragmented Cache Attacks Against AES Using Performance Monitoring Counters. In: Naiouf, M., Chichizola, F., Rucci, E. (eds) Cloud Computing and Big Data. JCC&BD 2019. Communications in Computer and Information Science, vol 1050. Springer, Cham. https://doi.org/10.1007/978-3-030-27713-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27713-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27712-3

  • Online ISBN: 978-3-030-27713-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics