Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012 39th Annual International Symposium on Computer Architecture (ISCA) 2012
DOI: 10.1109/isca.2012.6237011
|View full text |Cite
|
Sign up to set email alerts
|

TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks

Abstract: Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on fixing the source of leaks either by limiting the flow of information through the side channel by modifying hardware, or by refactoring vulnerable software to protect sensitive data from leaking. These solutions are reactive and not preventative: while the modifications may protect against a single attack, they do nothing to prevent f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(59 citation statements)
references
References 19 publications
0
58
0
Order By: Relevance
“…First, using ideas similar to those presented in [2] and [20], we split program execution into coarse-grain time epochs. Second, we architect the secure processor with learning mechanisms that choose a new ORAM rate out of a set of allowed rates only at the end of each epoch.…”
Section: An Overview Of Our Proposalmentioning
confidence: 99%
See 2 more Smart Citations
“…First, using ideas similar to those presented in [2] and [20], we split program execution into coarse-grain time epochs. Second, we architect the secure processor with learning mechanisms that choose a new ORAM rate out of a set of allowed rates only at the end of each epoch.…”
Section: An Overview Of Our Proposalmentioning
confidence: 99%
“…If the adversary and secure processor share main memory (e.g., a DRAM DIMM), a straightforward way to measure ORAM access frequency is for the adversary to measure its own average DRAM access latency (e.g., use performance counters to measure resource contention [20,35]). …”
Section: Measuring Path Oram Timingmentioning
confidence: 99%
See 1 more Smart Citation
“…Papers such as [37] discussed mitigating side-channel attacks in different environments. This paper proposed a general mitigation strategy that focuses on the infrastructure used to measure side channel leaks rather than the source of leaks.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Note that techniques such as cache partitioning can isolate the cache activity of one thread from another, but it does not eliminate the memory timing channels, i.e., memory latencies of one thread are impacted by the cache miss rate of the co-scheduled thread. Martin et al [13] thwart timing channel attacks by limiting a user's ability to take fine-grained timing measurements. Saltaformaggio et al [22] identify potential attacks because of atomic instructions that can lock up the entire memory system; they develop solutions that require hypervisor extensions.…”
Section: Related Workmentioning
confidence: 99%