Under the dome: preventing hardware timing information leakage - CEA - Commissariat à l’énergie atomique et aux énergies alternatives Accéder directement au contenu
Communication Dans Un Congrès Année : 2021

Under the dome: preventing hardware timing information leakage

Mathieu Escouteloup
  • Fonction : Auteur
  • PersonId : 1090004
Ronan Lashermes
  • Fonction : Auteur

Résumé

Numerous timing side-channels attacks have been proposed in the recent years, showing that all shared states inside the microarchitecture are potential threats. Previous works have dealt with this problem by considering those "shared states" separately and not by looking at the system as a whole. In this paper, instead of reconsidering the problematic shared resources one by one, we lay out generic guidelines to design complete cores immune to microarchitectural timing information leakage. Two implementations are described using the RISC-V ISA with a simple extension. The cores are evaluated with respect to performances, area and security, with a new open-source benchmark assessing timing leakages. We show that with this "generic" approach, designing secure cores even with complex features such as simultaneous multithreading is possible. We discuss about the trade-o█s that need to be done in that respect regarding the microarchitecture design.
Fichier non déposé

Dates et versions

cea-04176907 , version 1 (03-08-2023)

Identifiants

Citer

Jacques Fournier, Mathieu Escouteloup, Ronan Lashermes. Under the dome: preventing hardware timing information leakage. CARDIS 2021, Nov 2021, Luebeck, Germany. pp.233 - 253, ⟨10.1007/978-3-030-97348-3_13⟩. ⟨cea-04176907⟩
8 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More