Title :
CC-Hunter: Uncovering Covert Timing Channels on Shared Processor Hardware
Author :
Jie Chen ; Venkataramani, Guru
Author_Institution :
George Washington Univ., Washington, DC, USA
Abstract :
As we increasingly rely on computers to process and manage our personal data, safeguarding sensitive information from malicious hackers is a fast growing concern. Among many forms of information leakage, covert timing channels operate by establishing an illegitimate communication channel between two processes and through transmitting information via timing modulation, thereby violating the underlying system´s security policy. Recent studies have shown the vulnerability of popular computing environments, such as cloud computing, to these covert timing channels. In this work, we propose a new micro architecture-level framework, CC-Hunter, that detects the possible presence of covert timing channels on shared hardware. Our experiments demonstrate that Chanter is able to successfully detect different types of covert timing channels at varying bandwidths and message patterns.
Keywords :
security of data; CC-Hunter; Chanter; covert timing channel uncovering; illegitimate communication channel; information leakage; malicious hackers; micro architecture-level framework; sensitive information safeguarding; shared processor hardware; timing modulation; Bandwidth; Computers; Hardware; Histograms; Software; Timing; Trojan horses; Algorithms; Covert timing channels; Detection; Shared hardware;
Conference_Titel :
Microarchitecture (MICRO), 2014 47th Annual IEEE/ACM International Symposium on
Conference_Location :
Cambridge
DOI :
10.1109/MICRO.2014.42