Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor

被引:1
|
作者
Guo, Pengfei [1 ]
Yan, Yingjian [1 ]
Wang, Junjie [1 ]
Zhong, Jingxin [1 ]
Liu, Yanjiang [1 ]
Xu, Jinsong [1 ]
机构
[1] Informat Engn Univ, Coll Cryptog Engn, Zhengzhou 450001, Peoples R China
关键词
Evaluation metrics suite; Cache attacks; RISC-V; Cross-core attack; Chipyard; ATTACKS;
D O I
10.1016/j.cose.2023.103480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Caches are key microarchitectural components of modern processors to improve memory access speed. However, attackers can readily implement timing side-channel attacks by exploiting the inherent time difference between cache hits and misses, which brings serious security threats to computer systems. In recent years, cache attacks have achieved fruitful consequences regarding attack techniques, targets, and platforms. At the same time, in order to measure the cache vulnerability, researchers have been looking at verifying the security policies and have proposed a variety of evaluation metrics. However, there are certain limitations in the current metrics, such as harsh assumptions, the distinguishing ability cannot be maintained all the time, the false positive and false negative noises can not be explicitly quantified, other tools are needed, and the verification environment is difficult to reproduce. To face these issues, we proposed a set of evaluation metrics, which includes the highest score (HS), minimum rounds to disclosure (MRD), and key score scissors differential (KSSD); we give the formal expressions in practice and theoretical, respectively. In order to facilitate the accurate reproduction of the experimental environment and results, we build a dual-core RISC-V bare-metal system based on the open-source framework Chipyard. On this basis, we conduct comprehensive evaluations to exploit vulnerabilities within the RISC-V cache architecture to verify the validity of the metrics suite. Furthermore, we compared the metrics with the commonly used success rate (SR) and guessing entropy (GE). The comparison results show that our proposed metrics suite can accurately depict the effects of attacks. Moreover, KSSD can maintain discrimination and converge quickly; MRD has more practical guidance; HS can specifically describe false negative noises. Finally, we perform a theoretical evaluation of AES algorithms with different T-table implementations using the proposed metrics, analyze the system's false positive and false negative noises, and suggest how the number of cache evictions can be determined under the random replacement policy.
引用
收藏
页数:16
相关论文
共 11 条
  • [1] Open-source Validation Suite for RISC-V
    Chupilko, Mikhail
    Kamkin, Alexander
    Protsenko, Alexander
    2019 20TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR/SOC TEST, SECURITY AND VERIFICATION (MTV 2019), 2019, : 7 - 12
  • [2] A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor
    Anh-Tien Le
    Trong-Thuc Hoang
    Ba-Anh Dao
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Cong-Kha Pham
    IEEE ACCESS, 2021, 9 (164597-164612) : 164597 - 164612
  • [3] An Open-Source Verification Framework for Open-Source Cores: A RISC-V Case Study
    Schiavone, Pasquale Davide
    Sanchez, Ernesto
    Ruospo, Annachiara
    Minervini, Francesco
    Zaruba, Florian
    Haugou, Germain
    Benini, Luca
    PROCEEDINGS OF THE 2018 26TH IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2018, : 43 - 48
  • [4] Open-Source RISC-V Processor IP Cores for FPGAs - Overview and Evaluation
    Hoeller, Roland
    Haselberger, Dominic
    Ballek, Dominik
    Roessler, Peter
    Krapfenbauer, Markus
    Linauer, Martin
    2019 8TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2019, : 122 - 127
  • [5] XiangShan Open-Source High Performance RISC-V Processor Design and Implementation
    Wang K.
    Xu Y.
    Yu Z.
    Tang D.
    Chen G.
    Chen X.
    Gou L.
    Hu X.
    Jin Y.
    Li Q.
    Li X.
    Lin J.
    Liu T.
    Liu Z.
    Wang H.
    Wang H.
    Zhang C.
    Zhang F.
    Zhang L.
    Zhang Z.
    Zhang Z.
    Zhao Y.
    Zhou Y.
    Zou J.
    Cai Y.
    Huan D.
    Li Z.
    Zhao J.
    He W.
    Sun N.
    Bao Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (03): : 476 - 493
  • [6] An Open-Source Framework for the Generation of RISC-V Processor plus CGRA Accelerator Systems
    Ling, Xiaoyi
    Notsu, Takahiro
    Anderson, Jason
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 35 - 42
  • [7] A Comparative Survey of Open-Source Application-Class RISC-V Processor Implementations
    Doerflinger, Alexander
    Albers, Mark
    Kleinbeck, Benedikt
    Guan, Yejun
    Michalik, Harald
    Klink, Raphael
    Blochwitz, Christopher
    Nechi, Anouar
    Berekovic, Mladen
    PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, : 12 - 20
  • [8] NoX: a Compact Open-Source RISC-V Processor for Multi-Processor Systems-on-Chip
    Silva, Anderson, I
    Susin, Altamiro
    Kastensmidt, Fernanda L.
    Beck, Antonio Carlos S.
    Azambuja, Jose Rodrigo
    2024 37TH SBC/SBMICRO/IEEE SYMPOSIUM ON INTEGRATED CIRCUITS AND SYSTEMS DESIGN, SBCCI 2024, 2024, : 130 - 134
  • [9] HPDcache: Open-Source High-Performance L1 Data Cache for RISC-V Cores
    Fuguet, Cesar
    PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2023, CF 2023, 2023, : 377 - 378
  • [10] Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era
    Di Mascio, Stefano
    Menicucci, Alessandra
    Gill, Eberhard
    Furano, Gianluca
    Monteleone, Claudio
    COMPUTER SCIENCE REVIEW, 2021, 39