Architecting against Software Cache-Based Side-Channel Attacks

被引:18
作者
Kong, Jingfei [1 ]
Aciicmez, Onur [2 ]
Seifert, Jean-Pierre [3 ,4 ]
Zhou, Huiyang [5 ]
机构
[1] Adv Micro Devices Inc, Graph Prod Grp, Orlando, FL 32817 USA
[2] Samsung Informat Syst Amer, Adv Technol Lab, San Jose, CA 95134 USA
[3] Tech Univ Berlin, D-10587 Berlin, Germany
[4] Telekom Innovat Labs, D-10587 Berlin, Germany
[5] N Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
关键词
Cache memories; private/public key cryptosystems; side-channel attacks; architectural support for computer security;
D O I
10.1109/TC.2012.78
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Using cache-like architectural components including data caches, instruction caches, or branch target buffers as a side channel, software cache-based side-channel attacks are able to derive secret keys used in cryptographic operations through legitimate software activities. Existing software solutions are typically application specific and incur substantial performance overhead. Recent hardware proposals against attacks on data caches, although effective in reducing performance overhead, may still be vulnerable to advanced attacks. Furthermore, efficient defenses against attacks on other cache structures, including instruction caches and branch target buffers, are missing. In this paper, we propose hardware-software integrated approaches to defend against software cache-based attacks comprehensively. For attacks on data caches, we propose to use preloading, informing loads, and informing loads with software random permutation to secure the partition-locked cache (PLcache), the random permutation (RPcache) and regular caches, respectively. These approaches present different tradeoffs between hardware complexity and performance overhead. To defend against attacks on instruction caches, we show that the PLcache with preloading and the RPcache provide good protection. To defend against attacks based on branch target buffers, we propose to adopt a new update policy to eliminate potential information leaking. Our experiments show that the proposed schemes not only provide strong security protection but also incur small performance overhead.
引用
收藏
页码:1276 / 1288
页数:13
相关论文
共 34 条
[1]  
Aciicmez O., 2007, P ACM WORKSH COMP SE
[2]  
Aciicmez O., 2007, P CRYPT TRACK RSA C
[3]  
Aciicmez O., 2008, P CRYPT TRACK RSA C
[4]  
Aciicmez O., 2007, P ACM S INF COMP COM
[5]  
Aciicmez Onur, 2010, P 12 INT C CRYPT HAR
[6]  
[Anonymous], P FAST SOFTW ENCR WO
[7]  
[Anonymous], 2006, P CRYPT TRACK RSA C
[8]  
[Anonymous], P 4 WORKSH FAULT DIA
[9]  
Bernstein D., 2005, RAPID POST
[10]  
Blommer J., 2007, P WORKSH SEL AR CRYP