Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2023

Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections

Résumé

Timing side-channels are an identified threat for security critical software. Existing countermeasures have a cost either on the hardware requirements or execution time. We focus on low-cost microcontrollers that have a very low computational capacity. Although these processors do not feature out-of-order execution or speculation, they remain vulnerable to timing attacks exploiting the varying latencies of ALU operations or memory accesses. We propose to augment the RISC-V ISA with security primitives that have a guaranteed timing behavior. These primitives allow constant time ALU operations and memory accesses that do not alter the state of the cache. Our approach has a low overhead in terms of hardware cost, binary code size, and execution time both for the constant time secure program and other programs running concurrently on the same hardware.
Fichier principal
Vignette du fichier
silm2023-cache-protection.pdf (289.78 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-04155139 , version 1 (07-07-2023)

Licence

Paternité

Identifiants

  • HAL Id : hal-04155139 , version 1

Citer

Nicolas Gaudin, Jean-Loup Hatchikian-Houdot, Frédéric Besson, Pascal Cotret, Gogniat Guy, et al.. Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul 2023, Delft, Netherlands. pp.1-7. ⟨hal-04155139⟩
88 Consultations
87 Téléchargements

Partager

Gmail Facebook X LinkedIn More