Memory encryption engine cache-based covert channel attack메모리 암호화 엔진 캐시 기반 은닉 채널 공격

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 758
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Dongjun-
dc.contributor.advisor김동준-
dc.contributor.authorHan, Youngkwang-
dc.date.accessioned2019-09-04T02:49:07Z-
dc.date.available2019-09-04T02:49:07Z-
dc.date.issued2019-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=843797&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/267169-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2019.2,[ⅲ, 26 p. :]-
dc.description.abstractMicroarchitectural covert channel attack is a threat when multiple tenants in cloud service share hardware resources. Most of IaaS (Infrastructure as a Service) cloud service provides each physical core and virtual machine to their tenants, so various kinds of cross-core microarchitectural attacks have researched In this work, we propose a novel cross-core covert channel attack that exploits new microarchitecture that have been introduced to support memory encryption - in particular, the Memory Encryption Engine(MEE) cache. The MEE cache is a shared resource but only utilized when accessing the integrity tree data and provides opportunity for a stealthy covert channel attack. However, there are challenges since MEE cache organization is not publicly known, and the access behavior and covered data differ from a conventional cache. Hence, we reverse engineer MEE cache and demonstrate how the MEE cache can be exploited to establish a covert channel communication. MEE cache covert channel is evaluated in native system, and shows about 35KBps bit rate and 1.7% error rate. Our covert channel shows robustness without any error handling scheme in the situation where main memory and general cache are intensively utilized. Also, the previous defense mechanism for general cache attack can not be directly applied to MEE cache covert channel attack due to different characteristics. There is possible mitigation for our covert channel, but the mitigation has trade-off.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectMicroarchitectural covert channel▼atiming channel attack▼across-core covert channel▼amemory encryption engine-
dc.subject마이크로아키텍처 은닉 채널▼a타이밍 채널 공격▼a크로스 코어 은닉 채널▼a메모리 암호화 엔진-
dc.titleMemory encryption engine cache-based covert channel attack-
dc.title.alternative메모리 암호화 엔진 캐시 기반 은닉 채널 공격-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthor한영광-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0