ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE

被引:0
|
作者
Zhu, Yifan
Li, Peinan
Zhao, Lutan
Meng, Dan
Hou, Rui [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/DAC56929.2023.10247744
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For Trusted Execution Environment (TEE), interrupt-based side-channel attacks are becoming significant threats. Malicious supervisors use interrupts to perform single-step side-channel attacks or to improve the accuracy of existing side-channel attacks. This paper proposes a secure interrupt handle mechanism dedicated to TEE, named ChaosINTC. (1) To prevent frequent interrupts, a dynamic interrupt response delay mechanism delays the interrupt delivery with a variable time. (2) To prevent maliciously modifying ISRs, an interrupt handler protecting mechanism performs isolation and integrity checking. We deployed ChaosINTC on an open-source RISC-V core and evaluated its performance via FPGA. Our design provides strong security with marginal hardware and performance costs.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Constructions of certificate-based signature secure against key replacement attacks
    Li, Jiguo
    Huang, Xinyi
    Mu, Yi
    Susilo, Willy
    Wu, Qianhong
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (03) : 421 - 449
  • [42] A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks
    Jin, Yong
    Tomoishi, Masahiko
    Matsuura, Satoshi
    Kitaguchi, Yoshiaki
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 1 - 6
  • [43] Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
    Shafi, Rehan
    Rahim, Aneel
    Bin Muhaya, Fahad
    Ashraf, Shehzad
    Sher, Muhammad
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 233 - +
  • [44] A Hash based Secure Scheme (HSS) against scan-based attacks on AES cipher
    Popat, Jayesh
    Mehta, Usha
    Upadhyay, Manisha
    2020 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2020, : 93 - 96
  • [45] Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study
    Alqahtani, Fatmah H.
    Alsulaiman, Fawaz A.
    COMPUTERS & SECURITY, 2020, 88
  • [46] A Learning-based Approach to Secure JTAG against Unseen Scan-based Attacks
    Ren, Xuanle
    Blanton, R. D.
    Tavares, Vitor Grade
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 541 - 546
  • [47] Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing
    Wu, Jun
    Dong, Mianxiong
    Ota, Kaoru
    Li, Jianhua
    Yang, Wu
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (03): : 341 - 352
  • [48] A Fog-based Approach to Secure Smart Grids Against Data Integrity Attacks
    Davoodi, M.
    Moslemi, R.
    Song, W.
    Velni, J. Mohammadpour
    2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2020,
  • [49] A novel blockchain based framework to secure IoT-LLNs against routing attacks
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    COMPUTING, 2020, 102 (11) : 2445 - 2470
  • [50] A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    Jhanjhi, Noor Zaman
    Humayun, Mamoona
    Ibrahim, Ashraf Osman
    Abdelmaboud, Abdelzahir
    SENSORS, 2022, 22 (18)