Timing Channels through Shared Hardware Accelerators: Attacks and Protection

نویسندگان

  • Tao Chen
  • Kai Wang
چکیده

Hardware specialization in the form of accelerators offer significant improvement in performance and energy efficiency compared to general-purpose processors. However, there is usually a lack of security guarantees by the existing hardware design methodologies. In this report, we show that shared hardware accelerators are vulnerable to timing channel attacks and can leak sensitive information. We demonstrate a covert channel attack on a real system consisting of a multicore processor and a shared hardware accelerator. We designed a communication protocol which allows two users of an accelerator to send arbitrary messages over the covert channel. To mitigate timing channel attacks, we propose a novel design automation approach that removes interference and allows hardware accelerators to be shared securely. Experimental results show that the proposed approach eliminates timing channels in shared hardware accelerators with small performance and area overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Full-Processor Timing Channel Protection with Applications to Secure Hardware Compartments

This paper presents timing compartments, a hardware architecture abstraction that eliminates microarchitectural timing channels between groups of processes of VMs running on shared hardware. When coupled with conventional access controls, timing compartments provide strong isolation comparable to running software entities on separate machines. Timing compartments use microarchitecture mechanism...

متن کامل

Hardware Based Strategies Against Side - Channel - Attack Implemented in WDDL

This contribution discusses cryptographic algorithm in hardware that protects the information leaks out of the device through so called „side channels“. Attacks on crypto-processors are based on analyses of the leaked data are known as sidechannel attacks (SCA). Important information, such as secret keys, can be obtained by observing the power consumption, the electromagnetic radiation, the tim...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

RSA-4096 with a Comparison of Real and Simulated Side-Channel Attacks

Today, designing cryptographic hardware and embedded systems requires much more attention due to the wide range of practical side-channel attacksa. The processors that are responsible to perform the operations defined in cryptographic algorithms should also be resistant to these kinds of side-channel-attacks as well as being efficient in terms of area, performance and latency. To improve the ha...

متن کامل

Toward Exposing Timing-Based Probing Attacks in Web Applications †

Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one webs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014