Projects per year
Abstract
Recent secure cache designs aim to mitigate side-channel attacks by randomizing the mapping from memory addresses to cache sets.
As vendors investigate deployment of these caches, it is crucial to understand their actual security.
In this paper, we consolidate existing randomization-based secure caches into a generic cache model.
We then comprehensively analyze the security of existing designs, including CEASER-S and SCATTERCACHE, by mapping them to instances of this model.
We tailor cache attacks for randomized caches using a novel PRIME+PRUNE+PROBE technique, and optimize it using burst accesses, bootstrapping, and multi-step profiling.
PRIME+PRUNE+PROBE constructs probabilistic but reliable eviction sets, enabling attacks previously assumed to be computationally infeasible.
We also simulate an end-to-end attack, leaking secrets from a vulnerable AES implementation.
Finally, a case study of CEASER-S reveals that cryptographic weaknesses in the randomization algorithm can lead to a complete security subversion.
Our systematic analysis yields more realistic and comparable security levels for randomized caches.
As we quantify how design parameters influence the security level, our work leads to important conclusions for future work on secure cache designs.
As vendors investigate deployment of these caches, it is crucial to understand their actual security.
In this paper, we consolidate existing randomization-based secure caches into a generic cache model.
We then comprehensively analyze the security of existing designs, including CEASER-S and SCATTERCACHE, by mapping them to instances of this model.
We tailor cache attacks for randomized caches using a novel PRIME+PRUNE+PROBE technique, and optimize it using burst accesses, bootstrapping, and multi-step profiling.
PRIME+PRUNE+PROBE constructs probabilistic but reliable eviction sets, enabling attacks previously assumed to be computationally infeasible.
We also simulate an end-to-end attack, leaking secrets from a vulnerable AES implementation.
Finally, a case study of CEASER-S reveals that cryptographic weaknesses in the randomization algorithm can lead to a complete security subversion.
Our systematic analysis yields more realistic and comparable security levels for randomized caches.
As we quantify how design parameters influence the security level, our work leads to important conclusions for future work on secure cache designs.
Original language | English |
---|---|
Title of host publication | 2021 IEEE Symposium on Security and Privacy (SP) |
Pages | 987-1002 |
ISBN (Electronic) | 978-1-7281-8934-5 |
DOIs | |
Publication status | Published - Aug 2021 |
Event | 42th IEEE Symposium on Security and Privacy - San Francisco, Virtuell, United States Duration: 20 May 2021 → 21 May 2021 |
Conference
Conference | 42th IEEE Symposium on Security and Privacy |
---|---|
Abbreviated title | IEEE SP 2021 |
Country/Territory | United States |
City | Virtuell |
Period | 20/05/21 → 21/05/21 |
Keywords
- secure cache
- cache architecture
- side channel
Fingerprint
Dive into the research topics of 'Systematic Analysis of Randomization-based Protected Cache Architectures'. Together they form a unique fingerprint.Projects
- 2 Finished
-
Leakage-Free - Hardware-Software Information Flow Analysis for Leakage-Free Code Generation
1/10/18 → 30/09/20
Project: Research project
-