Skip to main content

Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 719))

Abstract

Multitenancy is the biggest advantage of computing, where physical resources are shared among multiple clients. Virtualization facilitates multitenancy with the help of the hypervisor. Cloud providers virtualize the resources like CPU, network interfaces, peripherals, hard drives, and memory using hypervisor. In a virtualization environment, many virtual machines (VMs) can run on the same core with the help of the hypervisor by sharing the resources. The virtual machines (VMs) running on the same core are the target for the malicious or abnormal attacks like side-channel attacks. Cache-based attack in the cloud is one of the side-channel attacks. Cache is one of the resources shared among different VMs on the same core. The attacker can make use cache behavior and can perform the cache-based side-channel attack on the victim. In this paper, we explore different types of cache designs, categories of cache-based side-channel attacks and existing detection and mitigation techniques for cache-based side-channel attacks.

This is a preview of subscription content, log in via an institution.

References

  1. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in CCS, 2009, pp. 199–212.

    Google Scholar 

  2. Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China.

    Google Scholar 

  3. A. Shamir, E. Tramer. Acoustic cryptanalysis: on nosy people and noisy machines. Eurocrypt 2004 rump session, 2004.

    Google Scholar 

  4. Deepa G M et al, “An overview of acoustic side channel attack”, International Journal of Computer Science & Communication Networks, Vol 3(1), 15–20.

    Google Scholar 

  5. Godfrey, M., Zulkernine, M., “Preventing cache based side channel attacks in a cloud environment”, IEEE Transactions on Cloud Computing, Volume: 2, Issue: 4, Oct.-Dec. 1 2014.

    Google Scholar 

  6. Acıiçmez, O., Brumley, B. & Grabher, P., 2010. New results on instruction cache attacks. In CHES’10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems.

    Google Scholar 

  7. Yuval Yarom, Katrina Falkner “FLUSH + RELOAD: a High Resolution Low noise, L3 cache Side-Channel attack”, 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 719–732.

    Google Scholar 

  8. Osvik, D., Shamir, A. & Tromer, E., 2006. Cache attacks and countermeasures: the case of AES. In Topics in Cryptology–CT-RSA 2006. pp. 1–25.

    Google Scholar 

  9. Liu, F. & Lee, R.B., 2013. Security testing of a secure cache design. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP’13. New York, New.

    Google Scholar 

  10. Raphael Spreitzer, Benoıt Gerard, “Towards More Practical Time-Driven Cache Attacks” WISTP 2014, LNCS 8501, pp. 24–39, 2014.

    Google Scholar 

  11. K. Tiri, O. Acıic¸mez, M. Neve, and F. Andersen, “An analytical model for time-driven cache attacks,” in FSE’07, ser. LNCS, A. Biryukov, Ed., vol. 4593. Springer, 2007, pp. 399–413.

    Google Scholar 

  12. Anne Canteaut, Cedric Lauradoux, and Andre Seznec. Understanding cache attacks. Technical Report, April 2006. Available at: ftp://inria.fr/INRIA/publication/publi-pdf/RR/RR-5881.pdf.

  13. Fei Liu, Lanfang Ren, Hongatao Bai, “Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform”, i-scholar, Journals of computers, Vol. 9 2014, Published: 2014-04-01, pp: 1005–1013.

    Google Scholar 

  14. Z. Wu, Z. Xu, and H. Wang, “Whispers in the hyper-space: High-speed covert channel attacks in the cloud,” in USENIX Security, 2012, pp. 9–9.

    Google Scholar 

  15. Si Yu, Xiaolin Gui, Jiancai Lin, “An approach with two stage mode to detect cache based side channel attack”, IEEE Computer Society Washington, DC, USA ©2013.

    Google Scholar 

  16. M. Chiappetta, E. Savas, and C. Yilmaz, “Real time detection of cachebased side-channel attacks using hardware performance counters,” Cryptology ePrint Archive, Report 2015/1034, 2015, http://eprint.iacr.org/.

  17. Rui Zhang, Xiaojun Su & et al, “On mitigating the Risk of Cross-VM Covert Channel in Public Cloud:”, Parallel and Distributed Systems, IEEE Transactions on (Volume:26, Issue: 8), Date of Current Version: 13 July 2015 Page(s): 2327–2339.

    Google Scholar 

  18. Fei Liu, Lanfang Ren, Hongatao Bai, “Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform”, i-scholar, Journals of computers, Vol. 9 2014, Published: 2014-04-01Pages: 1005–1013.

    Google Scholar 

  19. Deian Stefan, Pablo Buiras, & et al. “Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling”, 18th European Symposium on Research in Computer Security, Egham, UK, September 9–13, 2013. Proceedings, Publisher Springer Berlin Heidelberg.

    Google Scholar 

  20. Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz, “STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud”, Security’12 Proceedings of the 21st USENIX conference on Security symposium” ACM, 2012.

    Google Scholar 

  21. Godfrey Zulkernine M, “Preventing Cache-Based Side-Channel Attacks in a Cloud Environment”, Cloud Computing, IEEE Transactions on (Volume:2, Issue: 4), Issue Date: Oct.-Dec. 1 2014, Page(s): 395–408.

    Google Scholar 

  22. Jicheng Shi, Xiang Song, Haibo Chen, Binyu Zang “Limiting cache based side channel in multi-tenant cloud using dynamic page colouring”, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharati S. Ainapure .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Ainapure, B.S., Shah, D., Rao, A.A. (2018). Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment. In: Sa, P., Sahoo, M., Murugappan, M., Wu, Y., Majhi, B. (eds) Progress in Intelligent Computing Techniques: Theory, Practice, and Applications. Advances in Intelligent Systems and Computing, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-10-3376-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3376-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3375-9

  • Online ISBN: 978-981-10-3376-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics