Title:
HIDE: Hardware-support for Leakage-Immune Dynamic Execution

dc.contributor.author Zhuang, Xiaotong
dc.contributor.author Zhang, Tao
dc.contributor.author Pande, Santosh
dc.contributor.author Lee, Hsien-Hsin Sean
dc.date.accessioned 2005-03-28T17:15:20Z
dc.date.available 2005-03-28T17:15:20Z
dc.date.issued 2003
dc.description.abstract Secure processors have been recently introduced, which enable new applications involving software anti-piracy, program execution certification, and secure mobile agents. Secure processors have built-in hardware support for cryptographic mechanisms and can prevent both software attacks and physical attacks. Several recent papers have shown how to construct a secure processor to protect the confidentiality [1][2][3]and integrity[4][3] of a program. The proposed designs are immune from spoofing, splicing and replay attacks. However, none of the previous work is able to address the attacks due to information leakage on the address bus. Dangers due to information leakage on the address bus have been acknowledged to be an important as well as a difficult problem[1]. In fact, in [4]this problem is actually the trigger of the replay attack described. In this paper, we show that several attacks are possible by monitoring the instruction access sequence on the address bus. Such attacks could emanate from identifying the core algorithms by pattern matching the control flow graph or from finding out or narrowing down critical variables that decide outcomes of conditional branches. We analyze the causes behind such information leakage and then determine the primary requirement that must be met to prevent it. Based on this requirement, we propose HIDE, a hardware-based approach to hide the instruction access sequence. The main goal of HIDE is to construct a fixed instruction access sequence issued to the memory to achieve zero leakage of control flow information, giving a security guarantee. Our base approach involves constructing a fixed instruction access sequence covering the whole program (called base access ring) to hide the actual instruction fetch. This might however lead to severe performance degradation due to tremendous stalls making the framework infeasible. Therefore, we propose two approaches to overcome this problem. In our scheme, the architecture dynamically tracks a hot function set. Based on the hot function set, the first approach involves prefetching blocks accordingly into an on-chip prefetch buffer. The second approach establishes a secondary access ring, which is smaller and faster than the base access ring. The instruction blocks are prefetched from the base ring into the secondary ring instead. We observe considerable elimination of degradation due to our architectural improvements. For 512K L2 cache, the degradation is reduced from 73% to 38%; for 1M L2, it is cut from 65% to 34% with a reasonable amount of hardware resource. en
dc.format.extent 955396 bytes
dc.format.mimetype application/pdf
dc.identifier.uri http://hdl.handle.net/1853/5939
dc.language.iso en_US
dc.publisher Georgia Institute of Technology en
dc.relation.ispartofseries CERCS;GIT-CERCS-03-21
dc.subject Anti-piracy software en
dc.subject Built-in hardware support for cryptographic mechanisms en
dc.subject Hardware-support for Leakage-Immune Dynamic Execution en
dc.subject HIDE en
dc.subject Information leakage en
dc.subject Malicious attacks en
dc.subject Program execution certification en
dc.subject Secure mobile agents en
dc.subject Secure processors
dc.subject Software attack prevention
dc.title HIDE: Hardware-support for Leakage-Immune Dynamic Execution en
dc.type Text
dc.type.genre Technical Report
dspace.entity.type Publication
local.contributor.author Pande, Santosh
local.contributor.corporatename Center for Experimental Research in Computer Systems
local.relation.ispartofseries CERCS Technical Report Series
relation.isAuthorOfPublication 6239fe5b-32c4-4067-9614-1ccca3374873
relation.isOrgUnitOfPublication 1dd858c0-be27-47fd-873d-208407cf0794
relation.isSeriesOfPublication bc21f6b3-4b86-4b92-8b66-d65d59e12c54
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
git-cercs-03-21.pdf
Size:
933 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.86 KB
Format:
Item-specific license agreed upon to submission
Description: