Abstract
The Spectre attacks in modern processors have been inherently conveyed in the major Docker clients. The speculative execution mechanism in a processor can be maliciously used to access unauthorized content of other users, where the processor is the same for all the tenants. Instructions and code that completed execution and remained in the micro-architecture as cache could be accessed by the attacker through cache-side channel attacks. In this paper, we propose an automated solution to detect susceptible code snippets in the binary program and implement a patch to avoid further attacks. The proposed methodology extracts control flow, address analysis and taint analysis to detect the conditional branches that maliciously access memory speculatively. We have used the Kocher tests, which are a set of susceptible code patterns to generate malicious snippets. In a nutshell, the proposed system implements fences around suspicious conditional branches that stop speculative execution in the processor. Moreover, our evaluation also considers runtime overhead, analysis time, and effectiveness.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 243-248 |
| Number of pages | 6 |
| ISBN (Electronic) | 9798350345933 |
| DOIs | |
| State | Published - 2022 |
| Externally published | Yes |
| Event | 2022 International Conference on Frontiers of Information Technology, FIT 2022 - Islamabad, Pakistan Duration: 12 Dec 2022 → 13 Dec 2022 |
Publication series
| Name | Proceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022 |
|---|
Conference
| Conference | 2022 International Conference on Frontiers of Information Technology, FIT 2022 |
|---|---|
| Country/Territory | Pakistan |
| City | Islamabad |
| Period | 12/12/22 → 13/12/22 |
Bibliographical note
Publisher Copyright:© 2022 IEEE.
Keywords
- Containers
- Docker
- Spectre Attack
- Virtual Machines
ASJC Scopus subject areas
- Artificial Intelligence
- Computer Networks and Communications
- Computer Science Applications
- Computer Vision and Pattern Recognition
- Information Systems
- Software
- Information Systems and Management
- Control and Optimization
Fingerprint
Dive into the research topics of 'Let's Prevent Spectre Attacks in the Docker Containers Too'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver