acm-header
Sign In

Communications of the ACM

ACM TechNews

A Security Technique to Fool Would-Be Cyberattackers


View as: Print Mobile App Share:

Researchers demonstrate a method that safeguards a computer program’s secret information while enabling faster computation.

Credit: MIT News

Massachusetts Institute of Technology researchers have developed a new technique to prevent memory timing side-channel attacks by malware that exploits memory hardware common to multiple programs running on the same computer.

The DAGguise scheme prevents a contention attack, in which a hacker must determine the exact instant when the victim program is accessing the computer's memory by attempting to use the memory controller simultaneously; the delay in entry when the victim program is using the controller indicates the data being leaked.

DAGguise "shapes" a program's memory requests into a predefined pattern, using a directed acyclic graph (DAG) to process requests on a fixed schedule, adjusting their timing to prevent exploitation.

The technique also enables continued memory sharing, and is 12% faster than state-of-the-art security schemes.

From MIT News
View Full Article

 

Abstracts Copyright © 2022 SmithBucklin, Washington, DC, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account