ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE

被引:0
|
作者
Zhu, Yifan
Li, Peinan
Zhao, Lutan
Meng, Dan
Hou, Rui [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/DAC56929.2023.10247744
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For Trusted Execution Environment (TEE), interrupt-based side-channel attacks are becoming significant threats. Malicious supervisors use interrupts to perform single-step side-channel attacks or to improve the accuracy of existing side-channel attacks. This paper proposes a secure interrupt handle mechanism dedicated to TEE, named ChaosINTC. (1) To prevent frequent interrupts, a dynamic interrupt response delay mechanism delays the interrupt delivery with a variable time. (2) To prevent maliciously modifying ISRs, an interrupt handler protecting mechanism performs isolation and integrity checking. We deployed ChaosINTC on an open-source RISC-V core and evaluated its performance via FPGA. Our design provides strong security with marginal hardware and performance costs.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A collaborative management mechanism for UPIDs operation against MAD attacks
    Kang, Yan
    Yidan, Lu
    Bai, Xiaoqing
    Fanglu, Qin
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2023, 154
  • [32] Discretization Based Solutions for Secure Machine Learning Against Adversarial Attacks
    Panda, Priyadarshini
    Chakraborty, Indranil
    Roy, Kaushik
    IEEE ACCESS, 2019, 7 : 70157 - 70168
  • [33] TransGAN-Based Secure Indoor Localization Against Adversarial Attacks
    Yan, Qingli
    Xiong, Wang
    Wang, Hui-Ming
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5918 - 5930
  • [34] Against fault attacks based on random infection mechanism
    Zhang, Jinbao
    Wu, Ning
    Zhang, Xiaoqiang
    Zhou, Fang
    IEICE ELECTRONICS EXPRESS, 2016, 13 (21):
  • [35] Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
    Lu, Yang
    Li, Jiguo
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [36] A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 368 - +
  • [37] Efficient and secure password-based authentication protocols against guessing attacks
    Yonsei Univ, Seoul, Korea, Republic of
    Comput Commun, 9 (853-861):
  • [38] A new biometric identity based encryption scheme secure against DoS attacks
    Sarier, Neyire Deniz
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 23 - 32
  • [39] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861
  • [40] Event-Based Secure Consensus of Mutiagent Systems Against DoS Attacks
    Xu, Yong
    Fang, Mei
    Shi, Peng
    Wu, Zheng-Guang
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (08) : 3468 - 3476