SAluMC: Thwarting Side-Channel Attacks via Random Number Injection in RISC-V

被引:0
|
作者
Dang, Shibo [1 ]
Shao, Yunlong [1 ]
Li, Zhida [1 ]
Makanju, Adetokunbo [1 ]
Gulliver, Thomas Aaron [2 ]
机构
[1] New York Inst Technol, Coll Engn & Comp Sci, Vancouver, BC V5M 4X3, Canada
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
关键词
RISC-V microarchitecture; side-channel attack; random number; attack countermeasure;
D O I
10.3390/e27020202
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
As processor performance advances, the cache has become an essential component of computer architecture. Moreover, the rapid digital transformation of daily life has resulted in electronic devices storing greater amounts of sensitive information. Thus, device users are becoming more concerned about the security of their personal information, so improving processor performance is no longer the sole priority. Hardware vulnerabilities are generally more difficult to detect and address compared to software viruses and related threats. A common technique for exploiting hardware vulnerabilities is through side-channel attacks. They can bypass software security to extract personal information directly from hardware components like the cache or registers. This paper introduces a novel architecture for the arithmetic logic unit (ALU) and associated memory controller (MC) based on the RISC-V microarchitecture to mitigate side-channel attacks. The proposed approach employs hardware-generated random numbers and has minimal design costs, negligible impact on the original system structure, seamless integration, and easy modification of internal components. Results are presented that show it is effective against side-channel attacks.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] INVITED: Protecting RISC-V against Side-Channel Attacks
    De Mulder, Elke
    Gummalla, Samatha
    Hutter, Michael
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [2] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [3] MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V
    Wichelmann, Jan
    Peredy, Christopher
    Sieck, Florian
    Paetschke, Anna
    Eisenbarth, Thomas
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 3 - 23
  • [4] A combined side-channel and transient execution attack scheme on RISC-V processors
    Dong, Renhai
    Cui, Baojiang
    Sun, Yi
    Yang, Jun
    COMPUTERS & SECURITY, 2025, 150
  • [5] Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
    Ignatius, Titu Mary
    Singha, Thockchom Birjit
    Palathinkal, Roy Paily
    IEEE ACCESS, 2024, 12 : 150230 - 150248
  • [6] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [7] Thwarting code-reuse and side-channel attacks in embedded systems
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panagiotis
    COMPUTERS & SECURITY, 2023, 133
  • [8] Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity
    Crane, Stephen
    Homescu, Andrei
    Brunthaler, Stefan
    Larsen, Per
    Franz, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [9] Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications
    Zhang, Yuan
    Mao, Yunlong
    Xu, Minze
    Xu, Fengyuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1008 - 1018
  • [10] Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version
    Tamon Asano
    Takeshi Sugawara
    Journal of Cryptographic Engineering, 2024, 14 : 165 - 180