Cache attack monitoring and defending method, electronic equipment and system

An electronic device and caching technology, applied in the field of security, to achieve the effect of simplifying the data processing process and making it simple and easy to implement

Pending Publication Date: 2022-05-06
CHINA TELECOM CLOUD TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a cache attack monitoring and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cache attack monitoring and defending method, electronic equipment and system
  • Cache attack monitoring and defending method, electronic equipment and system
  • Cache attack monitoring and defending method, electronic equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical scheme and advantages of the embodiment of the invention more clear, the technical scheme in the embodiment of the invention will be clearly and completely described below in combination with the attached drawings in the embodiment of the invention. Obviously, the described embodiments are part of the embodiments of the invention, not all of the embodiments. Based on the embodiments of the invention, all other embodiments obtained by those skilled in the art without creative work belong to the protection scope of the invention.

[0045] Based on the statistics of the general characteristics of the attack process, especially the characteristics of the refresh operation, the invention proposes a real-time monitoring and defense scheme secflush. The invention detects the malicious refresh behavior through the hardware design, and defends the refresh based cache attack by prohibiting the malicious process from performing the refresh opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of security, in particular to a cache attack monitoring and defending method, electronic equipment and a system, and the method comprises the following steps: obtaining a current process and starting time of the current process; recording the end time of the current process and the refreshing times corresponding to the current process; determining a time interval based on the starting time and the ending time; when the time interval is between a first threshold value and a second threshold value and the number of refresh times is larger than a preset number of refresh times, the current process is determined to be a malicious process to prevent the refresh operation of the current process, the first threshold value is between a first refresh interval and a second refresh interval, the first refresh interval is a normal refresh interval, and the second refresh interval is a Spcetry attack interval; the second threshold is between a third refresh interval and a fourth refresh interval, the third refresh interval is a Flush and Time attack interval, and the fourth refresh interval is a Flush and Reload attack interval. By combining the time interval and the refreshing times, whether the attack is a hostile attack or not can be confirmed in real time.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a monitoring and defense method of cache attack, an electronic device and a system. Background technology [0002] When the information system and software system rely on specific physical equipment, a variety of physical state information such as electromagnetic radiation, sound, time, computer CPU memory operation and so on will be generated. As a typical side channel attack method, cache side channel attack is based on the analysis of the highly interactive and shared memory state between CPU cache processes during program operation, and uses the characteristics of different memory access time and cache access time to crack the cryptosystem. [0003] The concealment and destructive power of cache side channel attack are very strong, but there are still many deficiencies in the current defense measures against cache side channel attack, especially in the arm architecture, the defe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/1425H04L63/1416H04L63/1441
Inventor 王益斌
Owner CHINA TELECOM CLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products