论文标题

AutoCat:自动探索缓存攻击的增强学习

AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks

论文作者

Luo, Mulong, Xiong, Wenjie, Lee, Geunbae, Li, Yueying, Yang, Xiaomeng, Zhang, Amy, Tian, Yuandong, Lee, Hsien-Hsin S., Suh, G. Edward

论文摘要

现代微处理器的积极性能优化可能会导致安全漏洞。例如,基于计时的处理器缓存中的攻击可以窃取秘密键或破坏随机化。到目前为止,发现恰当的漏洞是由人类专家进行的,这效率低下且费力。鉴于未报告的漏洞使系统处于危险之中,因此需要自动工具可以探索漏洞。在本文中,我们提出了AutoCat,这是一种自动化探索框架,该框架使用增强学习(RL)找到缓存正时通道攻击序列。具体而言,AutoCat将缓存定时通道攻击制定为攻击程序与受害者计划之间的猜测游戏。因此,这种猜测游戏可以通过现代的深度RL技术来解决。 AutoCat可以在不同的缓存配置中探索攻击,而无需了解设计细节,以及不同的攻击和受害者程序配置。 AutoCat还可以找到绕过某些检测和防御机制的攻击。特别是,AutoCat发现了StealthyStreamline,这是一种新的攻击,能够绕过基于性能的检测,并且与基于最先进的LRU基于LRU对真实处理器的攻击相比,信息泄漏率高达71%。 AutoCat是使用RL来制作微体系定时通道攻击序列的第一个此类,并且可以加速缓存时正时通道探索,以进行安全的微处理器设计。

The aggressive performance optimizations in modern microprocessors can result in security vulnerabilities. For example, timing-based attacks in processor caches can steal secret keys or break randomization. So far, finding cache-timing vulnerabilities is mostly performed by human experts, which is inefficient and laborious. There is a need for automatic tools that can explore vulnerabilities given that unreported vulnerabilities leave the systems at risk. In this paper, we propose AutoCAT, an automated exploration framework that finds cache timing-channel attack sequences using reinforcement learning (RL). Specifically, AutoCAT formulates the cache timing-channel attack as a guessing game between an attack program and a victim program holding a secret. This guessing game can thus be solved via modern deep RL techniques. AutoCAT can explore attacks in various cache configurations without knowing design details and under different attack and victim program configurations. AutoCAT can also find attacks to bypass certain detection and defense mechanisms. In particular, AutoCAT discovered StealthyStreamline, a new attack that is able to bypass performance counter-based detection and has up to a 71% higher information leakage rate than the state-of-the-art LRU-based attacks on real processors. AutoCAT is the first of its kind in using RL for crafting microarchitectural timing-channel attack sequences and can accelerate cache timing-channel exploration for secure microprocessor designs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源