Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage | The George Washington University

Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage

Case ID: 020-045-Venkat

Researchers at GW have developed a novel solution that serves to capture the activity of an adversary in a cache timing channel. The novel solution can detect advanced attack variants of cache timing channel which can evade the detection of the existing technology by mimicking activities of benign applications and obfuscating mutual eviction patterns. The novel solution can also mitigate efficiently detected cache timing channels by re-purposing existing hardware prefetcher. The novel solution utilizes cache reuse distance, in that it measures cache reuse distance to captures the necessary activity of a spy or an adversary in every cache timing channel variant.

The disclosed invention can be implemented as either an apparatus, a device, a system, or a method as can be appreciated. The disclosed invention can include various aspects as follows: (i) a recording module that can measure and record a cache reuse distance associated with a computing application or aspect and which aspect can include a cache timing channel; (ii) an identification module that can identify an adversary attempting to utilize various advanced attack variants of cache timing channels as can be appreciated; (iii) at least one mitigating module that can mitigate any illegal communication that may transpire in a given cache timing channel. The researchers were able to achieve a significant bit error rate for an adversary based on conducted experiments

 

Fig. 1 – One example of an aspect of the disclosed invention

Applications:

  • Cybersecurity applications in various fields
    • Through detection of advanced variants of cache timing channels

Advantages:

  • Ability to detect advanced attack variants of cache timing channel which can evade the detection of the existing technology by mimicking activities of benign applications and obfuscating mutual eviction patterns
  • Ability to mitigate efficiently detected cache timing channels by re-purposing existing hardware prefetcher

Patent Information:

Title App Type Country Patent No. File Date Issued Date Patent Status
Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage US Utility *United States of America 11.921,849 2/22/2021 3/5/2024 Issued

For Information, Contact:

Michael Harpen
Licensing Manager
George Washington University
mharpen@gwu.edu

Inventors:

Guru Venkataramani
Milos Doroslovacki
Hongyu Fang
Keywords: