Cache Timing Side-Channel Vulnerability Checking with Computation Tree Logic

被引:14
|
作者
Deng, Shuwen [1 ]
Xiong, Wenjie [1 ]
Szefer, Jakub [1 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
基金
美国国家科学基金会;
关键词
timing side-channel; caches; Computation Tree Logic; ATTACKS; VERIFICATION; ARCHITECTURE; MITIGATION;
D O I
10.1145/3214292.3214294
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Caches are one of the key features of modern processors as they help to improve memory access timing through caching recently used data. However, due to the timing differences between cache hits and misses, numerous timing side-channels have been discovered and exploited in the past. In this paper, Computation Tree Logic is used to model execution paths of the processor cache logic, and to derive formulas for paths that can lead to timing side-channel vulnerabilities. In total, 28 types of cache attacks are presented: 20 types of which map to attacks previously categorized or discussed in literature, and 8 types are new. Furthermore, to enable practical vulnerability checking, we present a new approach that limits the depth of the execution paths that need to be checked by the Computation Tree Logic, allowing for use of bounded model checking for Computation Tree Logic based cache security veri. cation using the new three-step single-cache-block-access model.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] CacheGuard: A Behavior Model Checker for Cache Timing Side-Channel Security
    Xu, Zihan
    Yin, Lingfeng
    Lyu, Yongqiang
    Wang, Haixia
    Qu, Gang
    Wang, Dongsheng
    [J]. 27TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2022, 2022, : 19 - 24
  • [2] Cache-Based Side-Channel Vulnerability Detection Based on Symbolic Execution
    Yang, Chao
    Guo, Yun-Fei
    Hu, Hong-Chao
    Liu, Wen-Yan
    Huo, Shu-Min
    Wang, Ya-Wen
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (06): : 1194 - 1200
  • [3] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [4] Cache Side-Channel Attacks and Defenses
    Zhang, Weijuan
    Bai, Lu
    Ling, Yuqing
    Lan, Xiao
    Jia, Xiaoqi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [5] Symbolic Verification of Cache Side-Channel Freedom
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (11) : 2812 - 2823
  • [6] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [7] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    [J]. IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [8] Exposing Cache Timing Side-Channel Leaks through Out-of-Order Symbolic Execution
    Guo, Shengjian
    Chen, Yueqi
    Yu, Jiyong
    Wu, Meng
    Zuo, Zhiqiang
    Li, Peng
    Cheng, Yueqiang
    Wang, Huibo
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2020, 4 (OOPSLA):
  • [9] Model checking quantified computation tree logic
    Rensink, Arend
    [J]. CONCUR 2006 - CONCURRENCY THEORY, PROCEEDINGS, 2006, 4137 : 110 - 125
  • [10] Cache Side-Channel Attack on Mail User Agent
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    [J]. 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 236 - 238