论文标题
边线:延迟线(5月)如何从您的SOC泄漏秘密
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
论文作者
论文摘要
为了满足硅设备中不断增长的性能需求,SOC提供商越来越依赖软件软件合作。通过控制软件的电源或时钟管理等硬件资源,开发人员赚取了建立更灵活和有效的应用程序的可能性。尽管有好处,但这些硬件组件现在已接触到软件代码,并有可能被滥用作为危害可信环境,执行特权升级或窃取加密秘密秘密的开放态度。在这项工作中,我们介绍了Sideline,这是一种基于在高端SOC中广泛实现的延迟线组件的新型侧通道向量。在提供了如何访问和将延迟线数据转换为功耗信息的详细方法之后,我们证明这些实体可用于执行远程电源侧通道攻击。我们报告了对不同供应商的两个SOC进行的实验,并叙述了几种核心VS核心攻击方案,其中一个位于一个处理器核心中的对手过程旨在窃听位于另一个核心的受害者过程的活动。对于每种情况,我们都会演示对受害者核心运行的OpenSSL AES的秘密钥匙的对手能力。甚至更有害,我们表明,如果受害者或攻击者计划在操作系统上运行,这些攻击仍然是可行的。
To meet the ever-growing need for performance in silicon devices, SoC providers have been increasingly relying on software-hardware cooperation. By controlling hardware resources such as power or clock management from the software, developers earn the possibility to build more flexible and power efficient applications. Despite the benefits, these hardware components are now exposed to software code and can potentially be misused as open-doors to jeopardize trusted environments, perform privilege escalation or steal cryptographic secrets. In this work, we introduce SideLine, a novel side-channel vector based on delay-line components widely implemented in high-end SoCs. After providing a detailed method on how to access and convert delay-line data into power consumption information, we demonstrate that these entities can be used to perform remote power side-channel attacks. We report experiments carried out on two SoCs from distinct vendors and we recount several core-vs-core attack scenarios in which an adversary process located in one processor core aims at eavesdropping the activity of a victim process located in another core. For each scenario, we demonstrate the adversary ability to fully recover the secret key of an OpenSSL AES running in the victim core. Even more detrimental, we show that these attacks are still practicable if the victim or the attacker program runs over an operating system.