2022 article

EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security

EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security. 2022 55TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), pp. 1218–1236.

By: S. Ajorpaz n, D. Moghimi*, J. Collins, G. Pokam*, N. Abu-Ghazaleh* & D. Tullsen*

author keywords: Hardware Security; Side channel; Generative Adversarial Networks; Automatic Attack Sample Generation; Adversarial Machine Learning Attacks; Automated Hardware Performance Counter Engineering; Microarchitectural Attack Detection; Linearized Neural Network; ML Interpretability; Zero Day Attack Defense
TL;DR: An approach that reduces the overhead of state-of-art defenses by over 95%, by applying defenses only when attacks are detected, and uses a novel Generative framework, Evasion Vaccination (EVAX) for training ML models and engineering new security-centric performance counters. (via Semantic Scholar)
Source: Web Of Science
Added: December 12, 2022

This paper provides an end-to-end solution to defend against known microarchitectural attacks such as speculative execution attacks, fault-injection attacks, covert and side channel attacks, and unknown or evasive versions of these attacks. Current defenses are attack specific and can have unacceptably high performance overhead. We propose an approach that reduces the overhead of state-of-art defenses by over 95%, by applying defenses only when attacks are detected. Many current proposed mitigations are not practical for deployment; for example, InvisiSpec has 27% overhead and Fencing has 74% overhead while protecting against only Spectre attacks. Other mitigations carry similar performance penalties. We reduce the overhead for InvisiSpec to 1.26% and for Fencing to 3.45% offering performance and security for not only spectre attacks but other known transient attacks as well, including the dangerous class of LVI and Rowhammer attacks, as well as covering a large set of future evasive and zero-day attacks. Critical to our approach is an accurate detector that is not fooled by evasive attacks and that can generalize to novel zero-day attacks. We use a novel Generative framework, Evasion Vaccination (EVAX) for training ML models and engineering new security-centric performance counters. EVAX significantly increases sensitivity to detect and classify attacks in time for mitigation to be deployed with low false positives (4 FPs in every 1M instructions in our experiments). Such performance enables efficient and timely mitigations, enabling the processor to automatically switch between performance and security as needed.