Existing Side-channel attack techniques, such as meltdown attacks, show that attackers can exploit the microarchitecture and OS vulnerabilities to achieve their goals. In this paper, we present the development of our real-time system for detecting side-channel attacks. Unlike previous works, our proposed detection system does not rely on synchronisation between the attackers and victims. Instead, it uses processors’ performance indicators to capture malicious Flush+Reload activities with an accuracy of up to 99%. Moreover, the detection activities can be achieved with minimum time delay in both native and cloud systems with a low overhead performance approximately less than 1% in the host system.
|Title of host publication||2019 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings|
|Number of pages||6|
|Publication status||Published - 29 Jul 2019|
|Event||IEEE INISTA 2019: International Symposium on Innovations in Intelligent Systems and Applications - Sofia, Bulgaria|
Duration: 3 Jul 2019 → 5 Jul 2019
|Conference||IEEE INISTA 2019|
|Period||3/07/19 → 5/07/19|