DocumentCode :
1799756
Title :
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack
Author :
Ya Tan ; Jizeng Wei ; Wei Guo
Author_Institution :
Sch. of Comput. Sci. & Technol., Tianjin Univ., Tianjin, China
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
276
Lastpage :
283
Abstract :
Recently, a kind of micro-architectural side-channel analysis attacks, Branch Prediction Analysis (BPA), has been demonstrated to be practically feasible on the popular commodity PC platform. This attack extracts the secret information based on monitoring the branch target buffers (BTB). Some cryptography algorithms, such as RSA, ECC are naturally vulnerable to BPA because of the key-centric sequence of conditional branches. BPA attack can successfully steal almost all of the security key bits during one single encryption process in virtue of an elaborately designed and "legitimate" spy-process. Although there are some countermeasures existing in the state-of-art literatures, all of them are software-based methods, which lead to a series of design challenges. This paper proposes an architectural support scheme against the BPA attack comprehensively. A well-customized surveillance table with limited size is appended to record each process in order to dynamically recognize which one is malicious in time. And then a lock-based BTB scheme is utilized to protect the BTB visiting from BPA attack efficiently to ensure the sensitive information not be leaked due to the conditional branches loophole. Experimental results show that the proposed anti-BPA attack scheme not only leverages approximate 8KB area cost to provide strong security protection but also incurs slight performance improvement about 0.12% on average about the benchmarks. Meanwhile, it is transparent on the application level to alleviate the difficulties of the programmers.
Keywords :
data protection; program compilers; public key cryptography; BPA attack; BTB; ECC; RSA; antiBPA attack scheme; architectural support scheme; branch prediction analysis attack; branch target buffers; commodity PC platform; conditional branch; conditional branch loophole; cryptography algorithms; encryption process; key-centric sequence; legitimate spy-process; lock-based BTB scheme; microarchitectural side-channel analysis attacks; microarchitectural support countermeasures; security key bits; software-based methods; well-customized surveillance table; Ciphers; History; Pipelines; Program processors; Radiation detectors; BPA; micro-architecture analysis; public key systems; side channel attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/TrustCom.2014.38
Filename :
7011261
Link To Document :
بازگشت