MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V

被引:0
|
作者
Wichelmann, Jan [1 ]
Peredy, Christopher [1 ]
Sieck, Florian [1 ]
Paetschke, Anna [1 ]
Eisenbarth, Thomas [1 ]
机构
[1] Univ Lubeck, Lubeck, Germany
关键词
RISC-V; Side-channel attacks; Dynamic binary instrumentation; Software security;
D O I
10.1007/978-3-031-35504-2_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RISC-V is an emerging technology, with applications ranging from embedded devices to high-performance servers. Therefore, more and more security-critical workloads will be conducted with code that is compiled for RISC-V. Well-known microarchitectural side-channel attacks against established platforms like x86 apply to RISC-V CPUs as well. As RISC-V does not mandate any hardware-based side-channel countermeasures, a piece of code compiled for a generic RISC-V CPU in a cloud server cannot make safe assumptions about the microarchitecture on which it is running. Existing tools for aiding software-level precautions by checking side-channel vulnerabilities on source code or x86 binaries are not compatible with RISC-V machine code. In this work, we study the requirements and goals of architecture-specific leakage analysis for RISC-V and illustrate how to achieve these goals with the help of fast and precise dynamic binary analysis. We implement all necessary building blocks for finding side-channel leakages on RISC-V, while relying on existing mature solutions when possible. Our leakage analysis builds upon the modular side-channel analysis framework Microwalk, that examines execution traces for leakage through secret-dependent memory accesses or branches. To provide suitable traces, we port the ARM dynamic binary instrumentation tool MAMBO to RISC-V. Our port named MAMBO-V can instrument arbitrary binaries which use the 64-bit general purpose instruction set. We evaluate our toolchain on several cryptographic libraries with RISC-V support and identify multiple leakages.
引用
收藏
页码:3 / 23
页数:21
相关论文
共 50 条
  • [1] INVITED: Protecting RISC-V against Side-Channel Attacks
    De Mulder, Elke
    Gummalla, Samatha
    Hutter, Michael
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [2] Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version
    Tamon Asano
    Takeshi Sugawara
    Journal of Cryptographic Engineering, 2024, 14 : 165 - 180
  • [3] Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version
    Asano, Tamon
    Sugawara, Takeshi
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (01) : 165 - 180
  • [4] A combined side-channel and transient execution attack scheme on RISC-V processors
    Dong, Renhai
    Cui, Baojiang
    Sun, Yi
    Yang, Jun
    COMPUTERS & SECURITY, 2025, 150
  • [5] SAluMC: Thwarting Side-Channel Attacks via Random Number Injection in RISC-V
    Dang, Shibo
    Shao, Yunlong
    Li, Zhida
    Makanju, Adetokunbo
    Gulliver, Thomas Aaron
    ENTROPY, 2025, 27 (02)
  • [6] Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
    Ignatius, Titu Mary
    Singha, Thockchom Birjit
    Palathinkal, Roy Paily
    IEEE ACCESS, 2024, 12 : 150230 - 150248
  • [7] A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor
    Anh-Tien Le
    Trong-Thuc Hoang
    Ba-Anh Dao
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Cong-Kha Pham
    IEEE ACCESS, 2021, 9 (164597-164612) : 164597 - 164612
  • [8] Second International workshop on RISC-V for HPC (RISC-V HPC)
    Brown, Nick
    Davis, John
    Leidel, John
    Wong, Michael
    ACM International Conference Proceeding Series, 2023, : 1521 - 1522
  • [9] Securing a RISC-V architecture: A dynamic approach
    Pillement, S.
    Real, M. Mendez
    Pottier, J.
    Nieddu, T.
    Le Gal, B.
    Faucou, S.
    Bechennec, J. L.
    Briday, M.
    Girbal, S.
    Le Rhun, J.
    Gilles, O.
    Perez, D. Gracia
    Sintzoff, A.
    Coulon, J. R.
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [10] Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor
    Guo, Pengfei
    Yan, Yingjian
    Wang, Junjie
    Zhong, Jingxin
    Liu, Yanjiang
    Xu, Jinsong
    COMPUTERS & SECURITY, 2023, 135