8 CONCLUSION
We have proposed a mechanism to detect and pro-
tect against Cache side-channel attacks. The pro-
posed mechanism combines dynamic analysis and
static analysis to detect the suspicious behaviour of
the VM and then analyzes the executable files stored
in the disk and RAM of the suspicious VM to rec-
ognize the implicit characteristics of the attacks. Our
proposed mechanism combines the advantages of dy-
namic analysis and static analysis to reduce the load
on a system. The proposed mechanism can detect at-
tacks in the range of 96–99% accuracy and with 0.6–
25% CPU overheads. In future work, we aim to im-
prove and expand the analysis to include the other
microarchitectural attacks to which the shared virtu-
alized environments are exposed. We also plan to in-
tegrate the proposed mechanism with one of the well-
known antiviruses to maintain a shared virtualized en-
vironment guarded against viruses and microarchitec-
tural attacks.
REFERENCES
Akash, K. (2018). Flush-reload-attack. https://github.com/
AkashWorld/Flush-Reload-Attack.
Albalawi, A., Vassilakis, V., and Calinescu, R. (2021).
Memory deduplication as a protective factor in virtu-
alized systems. In Int. Conf. on Applied Cryptography
and Network Security, pages 301–317. Springer.
Anwar, S., Inayat, Z., Zolkipli, M. F., Zain, J. M., Gani,
A., Anuar, N. B., Khan, M. K., and Chang, V. (2017).
Cross-VM cache-based side channel attacks and pro-
posed prevention mechanisms: A survey. J. of Net-
work and Computer Applications, 93:259–279.
Bazm, M.-M., Sautereau, T., Lacoste, M., Sudholt, M., and
Menaud, J.-M. (2018). Cache-based side-channel at-
tacks detection through intel cache monitoring tech-
nology and hardware performance counters. In
3rd Int. Conf. on Fog and Mobile Edge Computing
(FMEC), pages 7–12. IEEE.
Chiappetta, M., Savas, E., and Yilmaz, C. (2016). Real time
detection of cache-based side-channel attacks using
hardware performance counters. Applied Soft Com-
puting, 49:1162–1174.
Chiappetta, M., Savas, E., and Yilmaz, C. (2020). Xlate:.
https://www.vusec.net/projects/xlate/.
Cho, J., Kim, T., Kim, S., Im, M., Kim, T., and Shin, Y.
(2020). Real-time detection for cache side channel
attack using performance counter monitor. Applied
Sciences, 10(3):984.
Gruss, D., Maurice, C., Wagner, K., and Mangard, S.
(2016). Flush+ flush: a fast and stealthy cache at-
tack. In Int. Conf. on Detection of Intrusions and Mal-
ware, and Vulnerability Assessment, pages 279–299.
Springer.
Gruss, D., Maurice, C., Wagner, K., and Mangard, S.
(2019a). Flush + Flush. https://github.com/IAIK/
flush flush.
Gruss, D., Spreitzer, R., and Mangard, S. (2015). Cache
template attacks: Automating attacks on inclusive
last-level caches. In 24th {USENIX} Security Sym-
posium ({USENIX} Security 15), pages 897–912.
Gruss, D., Spreitzer, R., and Mangard, S. (2019b). Cache
Template Attacks. https://github.com/IAIK/cache
template attacks.
Intel (2017). Intel
R
64 and ia32 ar-
chitectures performance monitoring
events. https://usermanual.wiki/Document/
335279performancemonitoringeventsguide.
2005880979/view.
Irazoqui, G., Eisenbarth, T., and Sunar, B. (2016). Mascat:
Stopping microarchitectural attacks before execution.
IACR Cryptol. ePrint Arch., 2016:1196.
Irazoqui, G., Eisenbarth, T., and Sunar, B. (2018). Mascat:
preventing microarchitectural attacks before distribu-
tion. In 8th ACM Conference on Data and Application
Security and Privacy, pages 377–388.
Irazoqui, G., Inci, M. S., Eisenbarth, T., and Sunar, B.
(2014). Wait a minute! a fast, cross-vm attack on aes.
In Int. Workshop on Recent Advances in Intrusion De-
tection, pages 299–319.
libguestfs (2019). Libguestfs tools for accessing and modi-
fying vm disk images. https://libguestfs.org/.
Microsoft/Avml (2020). Microsoft/avml: Avml - ac-
quire volatile memory for linux. https://github.com/
microsoft/avml.
Mushtaq, M., Akram, A., Bhatti, M. K., Rais, R. N. B.,
Lapotre, V., and Gogniat, G. (2018). Run-time detec-
tion of prime+ probe side-channel attack on aes en-
cryption algorithm. In Global Information Infrastruc-
ture and Networking Symp. (GIIS), pages 1–5.
Nagnagnet (2018). Prime+Probe is a last-level cache
side-channel attack. https://github.com/nagnagnet/
PrimeProbe.
Nepoche (2017). Flush and reload cache side channel at-
tack. https://github.com/nepoche/Flush-Reload.
Park, J. (2018). CSCA (Crypto Side Channel Attack). https:
//github.com/jinb-park/crypto-side-channel-attack.
Pasic, H. (2019). Side channel attack (cache attack. https:
//github.com/HarisPasic/SideChannelAttack.
Saxena, S., Sanyal, G., Srivastava, S., and Amin, R. (2017).
Preventing from cross-vm side-channel attack using
new replacement method. Wireless Personal Commu-
nications, 97(3):4827–4854.
VolatilityFoundation (2020). Volatility framework - volatile
memory extraction utility framework. https://github.
com/volatilityfoundation/volatility.
x86 and amd64 instruction reference (2019). Core instruc-
tions. https://www.felixcloutier.com/x86/index.html.
Yarom, Y. (2020). A micro-architectural side-channel
toolkit. https://cs.adelaide.edu.au/
∼
yval/Mastik/.
Yarom, Y. and Falkner, K. (2014). Flush+ reload: A high
resolution, low noise, l3 cache side-channel attack. In
23rd {USENIX} Security Symposium ({USENIX} Se-
curity 14), pages 719–732.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
514