Friday, December 27, 2024
Homecyber securityResearchers Found a New Technique to Defend Cache Side Channel Attacks

Researchers Found a New Technique to Defend Cache Side Channel Attacks

Published on

SIEM as a Service

Researchers from the University of Rochester have unveiled a novel technique to defend against cache side-channel attacks, a prevalent threat in modern computing systems.

The new method, named RollingCache, promises to enhance the security of shared systems by dynamically altering the cache access patterns, making it difficult for attackers to exploit cache contention.

Cache Side Channel Attacks

Cache-side channel attacks are cyberattacks that exploit the shared nature of cache memory in modern processors.

- Advertisement - SIEM as a Service

These attacks can leak sensitive information by observing the timing differences in cache access, which can reveal the access patterns of other processes.

There are two main categories of such attacks: reuse-based and contention-based. The latter, which RollingCache aims to counter, involves an attacker determining a victim’s access pattern by identifying the cache sets the victim accessed.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

The RollingCache Solution

RollingCache introduces a dynamic mapping system that disrupts the deterministic nature of cache access patterns.

Unlike previous methods that relied on encryption or cache partitioning, RollingCache uses runtime behavior to create non-deterministic mappings of memory addresses to cache sets.

This approach involves using indirection to map addresses to cache sets updated dynamically based on cache usage.

AddrSet A rolls from CacheSet K to L to I
AddrSet A rolls from CacheSet K to L to I

How RollingCache Works

The core idea behind RollingCache is to break the many-to-one deterministic mapping of memory addresses to cache sets.

This is achieved by allowing addresses to map to multiple cache sets and updating these mappings based on the cache’s runtime state.

This dynamic mapping makes it challenging for attackers to predict or determine which cache sets are being accessed, thereby thwarting contention-based attacks.

Security and Performance Evaluation

The Arxiv researchers evaluated RollingCache using the ChampSim simulator and the SPEC2017 benchmark suite.

The results showed that dynamic mapping effectively removes the deterministic ability of attackers to identify cache contention sources.

The performance impact of RollingCache was minimal, with an average slowdown of just 1.67% and an area overhead of approximately 5%.

Advantages Over Existing Techniques

RollingCache offers several advantages over existing defense mechanisms. It does not require predefined security domains, making it versatile across various computing environments.

Additionally, it avoids the need for data relocation or encryption, which can introduce significant performance and area overheads.

RollingCache is a practical and efficient solution for defending against cache side-channel attacks. The development of RollingCache marks a significant step forward in cybersecurity, particularly in defending against side-channel attacks.

As computing systems evolve and become more interconnected, the need for robust security measures like RollingCache will only grow.

This technique enhances security and maintains system performance, making it a valuable tool for protecting sensitive information in shared computing environments.

Researchers at the University of Rochester introduced RollingCache, a promising advancement in the fight against cache side-channel attacks.

By leveraging the dynamic nature of runtime behavior, RollingCache offers an innovative and effective defense mechanism that could set a new standard for cache security in modern computing systems.

As cyber threats evolve, solutions like RollingCache will be crucial in safeguarding our digital infrastructure.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly...

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which...

Adobe Warns of ColdFusion Vulnerability Allows Attackers Read arbitrary files

Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to...

Beware of New Malicious PyPI packages That Steals Login Details

Two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet's AI-driven OSS...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly...

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which...

Adobe Warns of ColdFusion Vulnerability Allows Attackers Read arbitrary files

Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to...