Microarchitectural Attacks and Countermeasures (Onur Aciicmez )

Microarchitectural Attacks and Countermeasures (Onur Aciicmez )

  1. Microarchitecture technology problem: due to strictly throughput, performance, and “performance per watt”-oriented goals of modern processor designs and also “time-to-market”-
    driven business philosophy, the resulting products, i.e., commodity processor architectures in the market, lack a thorough security analysis.
  2. Today’s high-end computer architectures employ several different components each of which is responsible for a specific task mostly to increase the performance of the system, such as:
    • Data cache
    • Branch prediction unit
    • Instruction cache
    • Functional units (multiplier)
  3. Side-channel analysis can be defined as the study of the relations between the strength of cryptosystems and data-dependent variations in the so-called side channel information, e.g., execution time and power consumption, generated during the execution of their physical implementations.
  4. The spy process-oriented MA attacks, except SFU analysis, rely on the fact that the execution of cryptosystems leaves persistent changes in the state of shared resources like cache and branch target buffer. In other words, the cipher execution leaves “footprints” on the observable state, i.e., the so-called metadata of these resources and an unprivileged spy process can keep track of these footprints if it runs on the same processor in parallel with the cipher.
  5. SFU analysis does not take advantage of persistent states. It follows a quite different approach and tries to detect when a certain functional unit is occupied by the cipher.
  6. Cache attacks:
    • trace-driven cache attacks : the adversary obtains the traces of cache activity for a sample of encryptions. A trace is as a sequence of cache hits and misses
    • time-driven cache attacks : the adversary observes the aggregate profile, i.e., total number of cache hits and misses or at least a value that can be used to approximate these numbers(total execution time )
    • access-driven cache attacks: the adversary determines the cache sets that the cipher process modifies.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值