skip to main content
10.1145/1456508.1456514acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Deconstructing new cache designs for thwarting software cache-based side channel attacks

Published:31 October 2008Publication History

ABSTRACT

Software cache-based side channel attacks present a serious tthreat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effective against particular attacks. Thus, a recent work identified cache interferences in general as the root cause and proposed two new cache designs, namely partition-locked cache (PLcache) and random permutation cache(RPcache), to defeat cache-based side channel attacks by eliminating/obfuscating cache interferences. In this paper, we analyze these new cache designs and identify significant vulnerabilities and shortcomings of those new cache designs. We also propose possible solutions and improvements over the original new cache designs to overcome the identified shortcomings.

References

  1. O. Aciçmez and Ç. K. Koç. Microarchitectural Attacks and Countermeasures. Chapter in "Cryptographic Engineering" by Ç. K. Koç, Springer, ISBN 0387718168, to be published in November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. O. Aciçmez. Yet Another MicroArchitectural Attack: Exploiting I-Cache. Proceedings of the 2007 ACM Workshop on Computer Security Architecture, pages 11--18, ACM Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. O. Aciçmez, Ç. K. Koç, and J.-P. Seifert. On The Power of Simple Branch Prediction Analysis. 2007 ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), R. Deng and P. Samarati, editors, pages 312--320, ACM Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. O. Aciçmez, Ç. K. Koç, and J.-P. Seifert. Predicting Secret Keys via Branch Prediction. Topics in Cryptology | CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, M. Abe, editor, pages 225--242, Springer-Verlag, Lecture Notes in Computer Science series 4377, 2007.Google ScholarGoogle Scholar
  5. O. Aciçmez and J.-P. Seifert. Cheap Hardware Parallelism Implies Cheap Security. 4th Workshop on Fault Diagnosis and Tolerance in Cryptography | FDTC 2007, pages 80--91, IEEE Computer Society, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. O. Aciçmez, W. Schindler, and Ç. K. Koç. Cache Based Remote Timing Attack on the AES. Topics in Cryptology | CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, M. Abe, editor, pages 271--286, Springer-Verlag, Lecture Notes in Computer Science series 4377, 2007.Google ScholarGoogle Scholar
  7. O. Aciçmez, W. Schindler, Ç. K. Koç. Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations. Proceedings of the 12th ACM Conference on Computer and Communications Security, C. Meadows and P. Syverson, editors, pages 139--146, ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 2001. Available at http://csrc.nist.gov/publications/fips/fips197/fips-197.pdfGoogle ScholarGoogle Scholar
  9. AMD. Lightweight Profiling Proposal, AMD, July 2007. Available at: http://developer.amd.com/assets/HardwareExtensionsforLeightweightProfilingPublic20070720.pdfGoogle ScholarGoogle Scholar
  10. D. J. Bernstein. Cache-timing attacks on AES. Technical Report, 37 pages, April 2005.Google ScholarGoogle Scholar
  11. J. Bonneau and I. Mironov. Cache-Collision Timing Attacks against AES. Cryptographic Hardware and Embedded Systems | CHES 2006, L. Goubin and M. Matsui, editors, pages 201--215, Springer-Verlag, Lecture Notes in Computer Science series 4249, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Brumley and D. Boneh. Remote Timing Attacks are Practical. Proceedings of the 12th Usenix Security Symposium, pages 1--14, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Burger and T.M. Austin. The Simplescalar Tool Set Version 2.0. Technical Report, Computer Science Department, University of Wisconsin-Madison, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Daemen, V. Rijmen. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer-Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Gueron. Advanced Encryption Standard (AES) Instructions Set. Technical Report, 35 pages, Intel Corporation, April 2008. Available at: http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set WP.pdfGoogle ScholarGoogle Scholar
  16. M. Neve and J.-P. Seifert. Advances on Access-driven Cache Attacks on AES. 13th International Workshop on Selected Areas of Cryptography | SAC'06, E. Biham and A. M. Youssef, editors, pages 147--162, Springer, Lecture Notes in Computer Science series 4356, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. OpenSSL Montgomery Exponentiation Side-Channel Local Information Disclosure Vulnerability. http://www.securityfocus.com/bid/25163/ 2007.Google ScholarGoogle Scholar
  18. OpenSSL Timing Attack RSA Private Key Information Disclosure Vulnerability. http://www.securityfocus.com/bid/7101/ 2003.Google ScholarGoogle Scholar
  19. D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology | CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, D. Pointcheval, editor, pages 1--20, Springer-Verlag, Lecture Notes in Computer Science series 3860, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Page. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02--003, Department of Computer Science, University of Bristol, June 2002.Google ScholarGoogle Scholar
  21. D. Page. Partitioned Cache Architecture as a Side Channel Defence Mechanism. Cryptography ePrint Archive, Report 2005/280, August 2005.Google ScholarGoogle Scholar
  22. C. Percival. Cache missing for fun and profit. BSDCan 2005, Ottawa, 2005.Google ScholarGoogle Scholar
  23. D. Song, D. Wagner, and X. Tian. Timing Analysis of Keystrokes and SSH Timing Attacks. Proceedings of the 10th Usenix Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. K. Tiri, O. Aciçmez, M. Neve, and F. Andersen. An Analytical Model for Time-Driven Cache Attacks. 14th International Workshop on Fast Software Encryption | FSE 2007, A. Biryukov, editor, pages 399--413, Springer, Lecture Notes in Computer Science series 4593, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Z. Wang and R. B. Lee. New Cache Designs for Thwarting Software Cache-based Side Channel Attacks, the 34th International Symposium on Computer Architecture (ISCA 2007), June 9--13, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Deconstructing new cache designs for thwarting software cache-based side channel attacks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CSAW '08: Proceedings of the 2nd ACM workshop on Computer security architectures
          October 2008
          72 pages
          ISBN:9781605583006
          DOI:10.1145/1456508

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 31 October 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader