Systematic Analysis of Randomization-based Protected Cache Architectures

Antoon Purnal, Lukas Giner, Daniel Gruß, Ingrid Verbauwhede

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

Abstract

Recent secure cache designs aim to mitigate side-channel attacks by randomizing the mapping from memory addresses to cache sets.
As vendors investigate deployment of these caches, it is crucial to understand their actual security.

In this paper, we consolidate existing randomization-based secure caches into a generic cache model.
We then comprehensively analyze the security of existing designs, including CEASER-S and SCATTERCACHE, by mapping them to instances of this model.
We tailor cache attacks for randomized caches using a novel PRIME+PRUNE+PROBE technique, and optimize it using burst accesses, bootstrapping, and multi-step profiling.
PRIME+PRUNE+PROBE constructs probabilistic but reliable eviction sets, enabling attacks previously assumed to be computationally infeasible.
We also simulate an end-to-end attack, leaking secrets from a vulnerable AES implementation.
Finally, a case study of CEASER-S reveals that cryptographic weaknesses in the randomization algorithm can lead to a complete security subversion.

Our systematic analysis yields more realistic and comparable security levels for randomized caches.
As we quantify how design parameters influence the security level, our work leads to important conclusions for future work on secure cache designs.
Originalspracheenglisch
Titel42th IEEE Symposium on Security and Privacy
PublikationsstatusEingereicht - 23 Mai 2021
Veranstaltung42th IEEE Symposium on Security and Privacy - San Francisco, Virtuell, USA / Vereinigte Staaten
Dauer: 20 Mai 202121 Mai 2021

Konferenz

Konferenz42th IEEE Symposium on Security and Privacy
KurztitelIEEE SP 2021
LandUSA / Vereinigte Staaten
OrtVirtuell
Zeitraum20/05/2121/05/21

Fingerprint Untersuchen Sie die Forschungsthemen von „Systematic Analysis of Randomization-based Protected Cache Architectures“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren