Run-Time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm

Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Rao Naveed Bin Rais, Vianney Lapotre, Guy Gogniat

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents a run-Time detection mechanism for access-driven cache-based Side-Channel Attacks (CSCAs) on Intel's x86 architecture. We demonstrate the detection capability and effectiveness of proposed mechanism on Prime+Probe attcks. The mechanism comprises of multiple machine learning models, which use real-Time data from the HPCs for detection. Experiments are performed with two different implementations of AES cryptosystem while under Prime+Probe attack. We provide results under stringent design constraints such as: realistic system load conditions, real-Time detection accuracy, speed, system-wide performance overhead and distribution of error (i.e., false positives and negatives) for the used machine learning models. Our results show detection accuracy of > 99% for Prime+Probe attack with performance overhead of 3-4% at the highest detection speed, i.e., within 1-2% completion of 4800 AES encryption rounds needed to complete a successful attack.

Original languageEnglish
Title of host publication2018 Global Information Infrastructure and Networking Symposium, GIIS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538672723
DOIs
Publication statusPublished - 2 Jul 2018
Externally publishedYes
Event2018 Global Information Infrastructure and Networking Symposium, GIIS 2018 - Thessaloniki, Greece
Duration: 23 Oct 201825 Oct 2018

Publication series

Name2018 Global Information Infrastructure and Networking Symposium, GIIS 2018

Conference

Conference2018 Global Information Infrastructure and Networking Symposium, GIIS 2018
Country/TerritoryGreece
CityThessaloniki
Period23/10/1825/10/18

Keywords

  • AES
  • Cryptography
  • Detection
  • HPCs
  • Machine Learning
  • Side-Channel Attacks
  • prime+Probe

Fingerprint

Dive into the research topics of 'Run-Time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm'. Together they form a unique fingerprint.

Cite this