The search functionality is under construction.

IEICE TRANSACTIONS on Information

Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks

Shuhei ENOMOTO, Hiroki KUZUNO, Hiroshi YAMADA

  • Full Text Views

    0

  • Cite this

Summary :

CPU flush instruction-based cache side-channel attacks (cache instruction attacks) target a wide range of machines. For instance, Meltdown / Spectre combined with FLUSH+RELOAD gain read access to arbitrary data in operating system kernel and user processes, which work on cloud virtual machines, laptops, desktops, and mobile devices. Additionally, fault injection attacks use a CPU cache. For instance, Rowhammer, is a cache instruction attack that attempts to obtain write access to arbitrary data in physical memory, and affects machines that have DDR3. To protect against existing cache instruction attacks, various existing mechanisms have been proposed to modify hardware and software aspects; however, when latest cache instruction attacks are disclosed, these mechanisms cannot prevent these. Moreover, additional countermeasure requires long time for the designing and developing process. This paper proposes a novel mechanism termed FlushBlocker to protect against all types of cache instruction attacks and mitigate against cache instruction attacks employ latest side-channel vulnerability until the releasing of additional countermeasures. FlushBlocker employs an approach that restricts the issuing of cache flush instructions and the attacks that lead to failure by limiting control of the CPU cache. To demonstrate the effectiveness of this study, FlushBlocker was implemented in the latest Linux kernel, and its security and performance were evaluated. Results show that FlushBlocker successfully prevents existing cache instruction attacks (e.g., Meltdown, Spectre, and Rowhammer), the performance overhead was zero, and it was transparent in real-world applications.

Publication
IEICE TRANSACTIONS on Information Vol.E105-D No.11 pp.1890-1899
Publication Date
2022/11/01
Publicized
2022/07/19
Online ISSN
1745-1361
DOI
10.1587/transinf.2022NGP0008
Type of Manuscript
Special Section PAPER (Special Section on Next-generation Security Applications and Practice)
Category

Authors

Shuhei ENOMOTO
  Tokyo University of Agriculture and Technology
Hiroki KUZUNO
  Kobe University
Hiroshi YAMADA
  Tokyo University of Agriculture and Technology

Keyword