TY - GEN
T1 - Analyzing cache side channels using deep neural networks
AU - Zhang, Tianwei
AU - Zhang, Yinqian
AU - Lee, Ruby B.
N1 - Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/12/3
Y1 - 2018/12/3
N2 - Cache side-channel attacks aim to breach the confidentiality of a computer system and extract sensitive secrets through CPU caches. In the past years, different types of side-channel attacks targeting a variety of cache architectures have been demonstrated. Meanwhile, different defense methods and systems have also been designed to mitigate these attacks. However, quantitatively evaluating the effectiveness of these attacks and defenses has been challenging. We propose a generic approach to evaluating cache side-channel attacks and defenses. Specifically, our method builds a deep neural network with its inputs as the adversary's observed information, and its outputs as the victim's execution traces. By training the neural network, the relationship between the inputs and outputs can be automatically discovered. As a result, the prediction accuracy of the neural network can serve as a metric to quantify how much information the adversary can obtain correctly, and how effective a defense solution is in reducing the information leakage under different attack scenarios. Our evaluation suggests that the proposed method can effectively evaluate different attacks and defenses.
AB - Cache side-channel attacks aim to breach the confidentiality of a computer system and extract sensitive secrets through CPU caches. In the past years, different types of side-channel attacks targeting a variety of cache architectures have been demonstrated. Meanwhile, different defense methods and systems have also been designed to mitigate these attacks. However, quantitatively evaluating the effectiveness of these attacks and defenses has been challenging. We propose a generic approach to evaluating cache side-channel attacks and defenses. Specifically, our method builds a deep neural network with its inputs as the adversary's observed information, and its outputs as the victim's execution traces. By training the neural network, the relationship between the inputs and outputs can be automatically discovered. As a result, the prediction accuracy of the neural network can serve as a metric to quantify how much information the adversary can obtain correctly, and how effective a defense solution is in reducing the information leakage under different attack scenarios. Our evaluation suggests that the proposed method can effectively evaluate different attacks and defenses.
UR - http://www.scopus.com/inward/record.url?scp=85060057427&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85060057427&partnerID=8YFLogxK
U2 - 10.1145/3274694.3274715
DO - 10.1145/3274694.3274715
M3 - Conference contribution
AN - SCOPUS:85060057427
T3 - ACM International Conference Proceeding Series
SP - 174
EP - 186
BT - ACM International Conference Proceeding Series
PB - Association for Computing Machinery
T2 - 34th Annual Computer Security Applications Conference, ACSAC 2018
Y2 - 3 December 2018 through 7 December 2018
ER -