SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection

被引:0
作者
Zhang, Shixuan [1 ]
Wang, Haixia [2 ]
Qiu, Pengfei [3 ]
Lyu, Yongqiang [2 ]
Wang, Hongpeng [1 ]
Wang, Dongsheng [4 ,5 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Guangdong, Peoples R China
[2] Tsinghua Univ, Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[3] Beijing Univ Posts & Telecommun BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100867, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[5] Zhongguancun Lab, Beijing 100094, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attacks; Security; Prefetching; Model checking; Microarchitecture; Coherence; Protocols; Hardware security; formal verification; cache side-channel attacks; model checking; ATTACKS; MODEL;
D O I
10.1109/TIFS.2024.3452002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent research has unveiled numerous cache-timing side-channel attacks exploiting the side effects of fine-grained cache features, such as coherence protocol and prefetch, among others. Traditional modeling methods and verification techniques are insufficient for verifying caches with fine-grained features and detecting cache timing vulnerabilities. There is a necessity for comprehensive verification of such complex cache designs. This paper presents SCAFinder, a verification framework targeting the cache designs with fine-grained features; it identifies cache side-channel attacks through model checking techniques. Specifically, it proposes a modeling methodology for cache designs that enables us to abstract the cache's behavior and latency characteristics. We implement a search algorithm for finding all counterexamples based on open-source model checking software. Subsequently, we add an attack scenario analysis module to discover attacks applicable to specific scenarios. We evaluate SCAFinder on Intel Skylake-X microarchitecture, demonstrating its capability to generate 7 new attack sequences exploiting coherence protocol and prefetch, and 12 new replacement policy-based side channels. As a case study, we successfully built a covert channel for one of the sequences on the real-world processor. To the best of our knowledge, we are the first to implement cross-core replacement policy-based attacks on non-inclusive caches.
引用
收藏
页码:8079 / 8093
页数:15
相关论文
共 41 条
  • [1] Fine-Grained Complexity of Safety Verification
    Chini, Peter
    Meyer, Roland
    Saivasan, Prakash
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2018, PT II, 2018, 10806 : 20 - 37
  • [2] Fine-Grained Complexity of Safety Verification
    Chini, Peter
    Meyer, Roland
    Saivasan, Prakash
    JOURNAL OF AUTOMATED REASONING, 2020, 64 (07) : 1419 - 1444
  • [3] Towards Fine-Grained Verification of Application Mobility
    Zhou, Yu
    Huang, Yankai
    Ge, Jidong
    Hu, Jun
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013 WORKSHOPS, 2014, 8182 : 75 - 83
  • [4] Bespoke Cache Enclaves: Fine-Grained and Scalable Isolation from Cache Side-Channels via Flexible Set-Partitioning
    Saileshwar, Gururaj
    Kariyappa, Sanjay
    Qureshi, Moinuddin
    2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), 2021, : 37 - 49
  • [5] Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection
    Iadarola, Giacomo
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    APPLIED SCIENCES-BASEL, 2020, 10 (22): : 1 - 20
  • [6] Symbolic Verification of Cache Side-Channel Freedom
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (11) : 2812 - 2823
  • [7] Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2839 - 2855
  • [8] RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping
    Zhang, Xingjian
    Gong, Haochen
    Chang, Rui
    Zhou, Yajin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3758 - 3771
  • [9] Formal Verification of Gate-Level Multiple Side Channel Parameters to Detect Hardware Trojans
    Abbasi, Imran Hafeez
    Lodhi, Faiq Khalid
    Kamboh, Awais Mehmood
    Hasan, Osman
    FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS (FTSCS 2016), 2017, 694 : 75 - 92
  • [10] Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems
    Liu, Yangyang
    Zhang, Pinchang
    Liu, Jun
    Shen, Yulong
    Jiang, Xiaohong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4059 - 4074