SecWalk: Protecting Page Table Walks Against Fault Attacks

Robert Schilling, Pascal Nasahl, Stefan Weiglhofer, Stefan Mangard

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The correct execution of a memory load and store is essential for the flawless execution of a program. However, as soon as devices are deployed in hostile environments, fault attacks can manipulate memory operations and subsequently alter the execution of a program. While memory accesses for simple processors with direct memory access can efficiently be protected against fault attacks, larger processors with virtual addressing lack this protection. However, the number of systems with larger application-class processors is growing, leaving many applications unprotected. It requires new countermeasures to efficiently protect memory accesses of application-class processors with virtual memory against fault attacks.

In this work, we present SecWalk, a design to efficiently protect all memory accesses of a program in the virtual and physical memory domain against fault attacks. We enhance residual-based pointer protection with a hardware-based secure page table walk inside the memory management unit. The page table walk securely translates a protected virtual address to a protected physical address by exploiting the redundancy properties of encoded addresses and a linking mechanism in the memory management unit. Furthermore, we extend the protection domain for virtual addresses to the TLB to also protect fast translations.

To evaluate the overhead of our design, we integrate SecWalk to an FPGA-based hardware implementation of an open-source RISC-V processor. The hardware evaluation shows that SecWalk extends the area of the design by 10%.
The software evaluation on a set of microbenchmarks shows an average code and runtime overhead of 11.05%. To show the applicability on real-life applications, we port the microkernel \sel to SecWalk, which yields a code overhead of 13.1% and a runtime overhead of 11.6%. This evaluation shows the overhead is small considering that SecWalk automatically protects all memory accesses of arbitrary applications against fault attacks.
Originalspracheenglisch
TitelProceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
Seiten56-67
Seitenumfang12
ISBN (elektronisch)9781665413572
DOIs
PublikationsstatusVeröffentlicht - 2021

Publikationsreihe

NameProceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021

ASJC Scopus subject areas

  • Sicherheit, Risiko, Zuverlässigkeit und Qualität
  • Hardware und Architektur
  • Computernetzwerke und -kommunikation

Fingerprint

Untersuchen Sie die Forschungsthemen von „SecWalk: Protecting Page Table Walks Against Fault Attacks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren