首页> 外文会议>IEEE International Symposium on High Performance Computer Architecture >Are Coherence Protocol States Vulnerable to Information Leakage?
【24h】

Are Coherence Protocol States Vulnerable to Information Leakage?

机译:相干协议状态是否容易受到信息泄漏的影响?

获取原文

摘要

Most commercial multi-core processors incorporate hardware coherence protocols to support efficient data transfers and updates between their constituent cores. While hardware coherence protocols provide immense benefits for application performance by removing the burden of software-based coherence, we note that understanding the security vulnerabilities posed by such oft-used, widely-adopted processor features is critical for secure processor designs in the future. In this paper, we demonstrate a new vulnerability exposed by cache coherence protocol states. We present novel insights into how adversaries could cleverly manipulate the coherence states on shared cache blocks, and construct covert timing channels to illegitimately communicate secrets to the spy. We demonstrate 6 different practical scenarios for covert timing channel construction. In contrast to prior works, we assume a broader adversary model where the trojan and spy can either exploit explicitly shared read-only physical pages (e.g., shared library code), or use memory deduplication feature to implicitly force create shared physical pages. We demonstrate how adversaries can manipulate combinations of coherence states and data placement in different caches to construct timing channels. We also explore how adversaries could exploit multiple caches and their associated coherence states to improve transmission bandwidth with symbols encoding multiple bits. Our experimental results on commercial systems show that the peak transmission bandwidths of these covert timing channels can vary between 700 to 1100 Kbits/sec. To the best of our knowledge, our study is the first to highlight the vulnerability of hardware cache coherence protocols to timing channels that can help computer architects to craft effective defenses against exploits on such critical processor features.
机译:大多数商用多核处理器都集成了硬件一致性协议,以支持其组成内核之间的高效数据传输和更新。虽然硬件一致性协议通过消除基于软件的一致性负担为应用程序性能带来了巨大好处,但我们注意到,了解这种经常使用且广泛采用的处理器功能所带来的安全漏洞对于将来的安全处理器设计至关重要。在本文中,我们演示了缓存一致性协议状态所暴露的新漏洞。我们提出了新颖的见解,以了解对手如何巧妙地操纵共享缓存块上的连贯状态,并构造隐蔽的计时渠道以非法向间谍传达秘密。我们演示了秘密时序通道构建的6种不同的实际方案。与以前的工作相比,我们假设一个更广泛的对手模型,其中特洛伊木马和间谍可以利用显式共享的只读物理页面(例如,共享库代码),或者使用内存重复数据删除功能隐式强制创建共享的物理页面。我们演示了对手如何操纵相干状态和不同缓存中的数据放置的组合以构造计时通道。我们还探讨了对手如何利用多个缓存及其关联的相干状态,以使用编码多个比特的符号来改善传输带宽。我们在商业系统上的实验结果表明,这些秘密定时通道的峰值传输带宽可以在700到1100 Kbits / sec之间变化。据我们所知,我们的研究是第一个强调硬件高速缓存一致性协议对定时通道的脆弱性的研究,该协议可帮助计算机架构师针对此类关键处理器功能的利用进行有效防御。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号