Fig. 1. IPC, L3 Miss, L2 Miss Count Values when Playing Video (Start: The Beginning of Attack, End: The End of Attack)
Fig. 2. IPC, L3 Miss, L2 Miss Count Values when Playing Music (Start: The Beginning of Attack, End: The End of Attack)
Fig. 3. Pseudo Code for Real-time Detection Program
Fig. 4. IPC, L3 Miss, L2 Miss Count Values when Playing Youtube (Start: The Beginning of Attack, End: The End of Attack)
References
- Yarom Yuval and Katrina E. Falkner, "Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack," USENIX Security, 2014.
- B. Gulmezoglu, M. Inci, G. Irazoki, T. Eisenbarth, and B. Sunar, "Cross-VM Cache Attacks on AES," IEEE Trans. Multi-Scale Comput. Syst., Vol.2, No.3, pp.211-222, 2016. https://doi.org/10.1109/TMSCS.2016.2550438
- Daniel Gruss, Raphael Spreitzer, and Stefan Mangard, "Cache Template Attacks : Automating Attacks on Inclusive Last-Level Cache," USENIX Security Symposium 2015.
- Daniel Gruss, Raphael Spreitzer, and Stefan Mangard, "Flush+Flush : A Fast and Stealthy Cache Attack," DIMVA 2016 Detection of Instruction and Malware, and Vulnerability Assessment.
- Manuel Weber, Michael Schwarz, Lukas Giner, and Daniel Gruss, "Hello from the Other Side : SSH over Robust Cache Covert Channels in the Cloud." Network and Distributed System Security Symposium 2017 (NDSS'17).
- Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar, "Systematic Reverse Engineering of Cache Slice Selection in Intel Processors," 2015 Euromicro Conference on Digital System Design (DSD).
- Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B Lee, "Last-Level Cache Side-Channel Attacks are Practical," 2015 IEEE Symposium on Security and Privacy.
- Intel Performance Counter Monitor [Online] https://docs.it4i.cz/software/debuggers/intel-performance-counter-monitor/-Intel Performance Counter Monitor.
- Machine Learning and Deep Learning for Everyone [Online], https://hunkim.github.io/ml/.
- What is Artificial Neural Network? [Online], http://blog.lgcns.com/1359.
- Y. Yarom, "Mastik: A Micro-Architectural Side-Channel Toolkit," [Online] https://cs.adelaide.edu.au/-yval/Mastik/.
- Irazoqui, Gorka, et al. "Wait a minute! A fast, Cross-VM attack on AES," Research in Attacks, Intrusions and Defenses. Springer International Publishing, pp.299-319, 2014.