Descripción
|
|
---|---|
In recent years, side-channel attacks have gained increasing attention, mainly due to their ability to extract sensitive infor- mation from their victims in an effortless way. Also, with the development and spread of cloud computing, where victims and potential attackers share physical infrastructure, these at- tacks are becoming a serious concern. For performance rea- sons, several resources as CPU cache memories have to be shared, leaving a door opened for attackers. However, when cryptographic processes are properly characterized it is pos- sible to detect attacks which abuse one shared resource as, for example, CPU cache. In this paper we present a timing char- acterization of a process implementing a cryptographic algo- rithm such as AES. Then we characterize the same encryp- tion process when suffering a cache attack and when shar- ing the CPU with other different processes to evaluate how they affect it and get accurate models. The main idea of this work is getting an accurate timing model to distinguish when a process is or not being attacked regarding to timing mea- surements. Once we get the model, we provide a detection algorithm that detects over 96% of attacks with false posi- tive rates around 5%. The false positive rate is reduced to 0% when discarding the initial transitory state related to the booting stage of a new process. | |
Internacional
|
Si |
Nombre congreso
|
Summer Computer Simulation Conference (SummerSim-SCSC) |
Tipo de participación
|
960 |
Lugar del congreso
|
Montreal, Canadá |
Revisores
|
Si |
ISBN o ISSN
|
978-1-5108-2424-9 |
DOI
|
|
Fecha inicio congreso
|
24/07/2016 |
Fecha fin congreso
|
27/07/2016 |
Desde la página
|
1 |
Hasta la página
|
8 |
Título de las actas
|
Proceedings SummerSim-SCSC 2016 |