Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23264
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity

Abstract: We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity techniques transform each program trace identically. Our diversity based technique instead transforms programs to make each program trace unique. This approach offers probabilistic protection against both online and off-line side-channel attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
79
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 127 publications
(80 citation statements)
references
References 35 publications
1
79
0
Order By: Relevance
“…Work in [129] have highlighted the importance of security when IoT is incorporated in the Industry 4.0. Integrity For maintaining the integrity, works such as [121] discuss how to protect CPS, IoT, or 3D printing against various side channel attacks. Integrity of IoT devices, heterogeneous systems, during industrial processing is crucial.…”
Section: Industrial Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…Work in [129] have highlighted the importance of security when IoT is incorporated in the Industry 4.0. Integrity For maintaining the integrity, works such as [121] discuss how to protect CPS, IoT, or 3D printing against various side channel attacks. Integrity of IoT devices, heterogeneous systems, during industrial processing is crucial.…”
Section: Industrial Processingmentioning
confidence: 99%
“…There have been various efforts to secure the hardware [142][143][144]. Next generation [111] data security [103] for IoT and CPS [117,118] security [119] for secure encryption for augmented reality [120] cloud data [103,105], secure vault for CAD files [104] Integrity Integrity layer for Product verification [112,114], Vendor management [6] Integrity attack -Maintain integrity in cloud data storage [108] trojan detection [113] detection methods [121] augmented reality data integrity [122], integrity assessment of replaced parts [123] Availability High availability cloud [108], High availability server [115], Protocols for access…”
Section: Hardware Security and Manufacturing Supply Chainmentioning
confidence: 99%
“…Previous works have already shown methods to attack computational and storage components by exploring features such as cache miss rates [14] [15] or the time required to perform floating point operations [16].…”
Section: Distributed Timing Attack (Dta)mentioning
confidence: 99%
“…-Diversifying the execution code: One possibility to mitigate cache side-channel attacks is to create different and unique program traces (that perform identical computations) for different executions. This countermeasure, proposed in [24], will prevent the Flush+Reload technique since the specific location of the function that the attacker wants to monitor would be different for different users (and thus, libraries would never be deduplicated).…”
Section: Preventing Cross-vm Code Detectionmentioning
confidence: 99%