Let's Prevent Spectre Attacks in the Docker Containers Too

  • Humdah Shakir Khan*
  • , Farooque Hassan Kumbhar
  • , Jawwad Ahmed Shamsi
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Spectre attacks in modern processors have been inherently conveyed in the major Docker clients. The speculative execution mechanism in a processor can be maliciously used to access unauthorized content of other users, where the processor is the same for all the tenants. Instructions and code that completed execution and remained in the micro-architecture as cache could be accessed by the attacker through cache-side channel attacks. In this paper, we propose an automated solution to detect susceptible code snippets in the binary program and implement a patch to avoid further attacks. The proposed methodology extracts control flow, address analysis and taint analysis to detect the conditional branches that maliciously access memory speculatively. We have used the Kocher tests, which are a set of susceptible code patterns to generate malicious snippets. In a nutshell, the proposed system implements fences around suspicious conditional branches that stop speculative execution in the processor. Moreover, our evaluation also considers runtime overhead, analysis time, and effectiveness.

Original languageEnglish
Title of host publicationProceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages243-248
Number of pages6
ISBN (Electronic)9798350345933
DOIs
StatePublished - 2022
Externally publishedYes
Event2022 International Conference on Frontiers of Information Technology, FIT 2022 - Islamabad, Pakistan
Duration: 12 Dec 202213 Dec 2022

Publication series

NameProceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022

Conference

Conference2022 International Conference on Frontiers of Information Technology, FIT 2022
Country/TerritoryPakistan
CityIslamabad
Period12/12/2213/12/22

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • Containers
  • Docker
  • Spectre Attack
  • Virtual Machines

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Information Systems
  • Software
  • Information Systems and Management
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Let's Prevent Spectre Attacks in the Docker Containers Too'. Together they form a unique fingerprint.

Cite this