S-Clflush: Securing Against Flush-based Cache Timing Side-Channel Attacks

  • Tejeshwar Thorawade Indian Institute of Technology
  • Prajakta Yeola Indian Institute of Technology
  • Varun Venkitaraman Indian Institute of Technology
  • Virendra Singh Indian Institute of Technology

Resumo


Micro-architectural attacks exploit intrinsic vulnerabilities within computing systems, circumventing advanced security techniques such as cryptographic algorithms, access control policies, and secure enclaves. These attacks encompass a range of methodologies, including cache timing side-channel attacks like Flush+Reload, Flush+Flush, and Prime+Probe, as well as speculative execution attacks such as Spectre and Meltdown. These exploits leverage specific characteristics of micro-architecture to infer sensitive data, posing a significant threat to system security. Cache timing side-channel attacks exploit the inclusive nature of the last-level cache (LLC) to deduce the memory access patterns of victim processes. By observing the timing variations associated with cache hits and misses, attackers can extract confidential information, such as cryptographic keys. Although existing mitigation strategies provide a level of security, they typically do so at the expense of system performance and increased hardware. These trade-offs limit the practical applicability of such defences in performance-critical environments. This paper proposes S-Clflush: Secure Clflush, an innovative defence mechanism specifically designed to counter flush-based cache timing side-channel attacks. S-Clflush achieves this by modifying the existing clflush instruction to prevent attackers from inferring memory access patterns based on cache access latency. Unlike traditional mitigation techniques, S-Clflush enhances security without incurring performance degradation or additional area overhead. The proposed mechanism is formally verified to ensure its security guarantees. Our evaluation against the state-of-the-art mitigation technique TimeCache shows a 0.5% improvement in performance and a 58% reduction in MPKI on average without adding area overhead.
Palavras-chave: Degradation, Prevention and mitigation, System performance, High performance computing, Side-channel attacks, Computer architecture, Hardware, Timing, Security, Data mining, cache timing side-channel, countermeasures, hardware security, clflush, flush reload, flush flush
Publicado
13/11/2024
THORAWADE, Tejeshwar; YEOLA, Prajakta; VENKITARAMAN, Varun; SINGH, Virendra. S-Clflush: Securing Against Flush-based Cache Timing Side-Channel Attacks. In: INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING (SBAC-PAD), 36. , 2024, Hilo/Hawaii. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2024 . p. 218-228.