论文标题

改革缓存布局:用硬件防御阻碍基于缓存的侧通道攻击

Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense

论文作者

Song, Wei, Hou, Rui, Liu, Peng, Li, Xiaoxin, Li, Peinan, Zhao, Lutan, Fu, Xiaofei, Sun, Yifei, Meng, Dan

论文摘要

由于基于缓存的侧通道攻击成为严重的安全问题,因此已经提出了各种防御措施并将其部署在软件和硬件中。因此,基于缓存的侧通道攻击对同一核心的流程的攻击变得非常困难。然后,最近的大多数攻击将其重点转移到了最后一级的缓存(LLC)。尽管缓存分区目前是针对滥用攻击有限责任公司的最有前途的防御,但它在挫败自动创建驱逐集或绕过用户地址空间布局随机化的侧通道攻击方面无效。实际上,这些攻击在当前的计算机系统中基本上是没有防御的。 我们提出了重新设计的高速缓存布局(\ textsf {rcl}) - 一种纯粹的硬件防御,以针对广泛的基于冲突的侧向通道攻击。 \ textsf {rcl}将映射从地址到高速缓存集;因此,攻击者无法准确推断其数据在缓存中的位置或使用缓存集来推断受害者的数据。据我们所知,这是第一个抗辩,以挫败上述在很大程度上没有防御的侧向攻击。 \ textsf {rcl}已在超级处理器中实现,详细的评估结果表明,\ textsf {rcl}仅在面积,频率和执行时间内仅产生少量成本。

As cache-based side-channel attacks become serious security problems, various defenses have been proposed and deployed in both software and hardware. Consequently, cache-based side-channel attacks on processes co-residing on the same core are becoming extremely difficult. Most of recent attacks then shift their focus to the last-level cache (LLC). Although cache partitioning is currently the most promising defense against the attacks abusing LLC, it is ineffective in thwarting the side-channel attacks that automatically create eviction sets or bypass the user address space layout randomization. In fact, these attacks are largely undefended in current computer systems. We propose Remapped Cache Layout (\textsf{RCL}) -- a pure hardware defense against a broad range of conflict-based side-channel attacks. \textsf{RCL} obfuscates the mapping from address to cache sets; therefore, an attacker cannot accurately infer the location of her data in caches or using a cache set to infer her victim's data. To our best knowledge, it is the first defense to thwart the aforementioned largely undefended side-channel attacks . \textsf{RCL} has been implemented in a superscalar processor and detailed evaluation results show that \textsf{RCL} incurs only small costs in area, frequency and execution time.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源