{"title":"Flush-Reload Attack and its Mitigation on an FPGA Based Compressed Cache Design","authors":"Prashant Mata, Nanditha P. Rao","doi":"10.1109/ISQED51717.2021.9424252","DOIUrl":null,"url":null,"abstract":"Several micro-architectural components such as caches, branch predictors and prefetchers are known to assist in side-channel data leaks. Side-channel attacks recover secret data by observing the timing behavior while the victim process accesses the cache or the memory. In this paper, we explore the impact of a Flush-Reload attack in the presence of a cache compression scheme. Cache compression technique increases the effective size of the cache through compression and appropriate placement of the compressed data blocks. We integrate the compressed cache design with a RISC-V processor core on an FPGA. We implement the Flush-Reload attack and find that the impact of the attack on a compressed cache scheme is likely to be weaker than that of an uncompressed design. To the best of our knowledge, this is the first attempt at understanding the role of side-channel attacks on a compressed cache design in hardware. We further explore the possibility of using a variable clock logic and observe that it reduces the effectiveness of the attack by 30 to 50%. However, this scheme could impact the cache performance by up to 2.9 times.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISQED51717.2021.9424252","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Several micro-architectural components such as caches, branch predictors and prefetchers are known to assist in side-channel data leaks. Side-channel attacks recover secret data by observing the timing behavior while the victim process accesses the cache or the memory. In this paper, we explore the impact of a Flush-Reload attack in the presence of a cache compression scheme. Cache compression technique increases the effective size of the cache through compression and appropriate placement of the compressed data blocks. We integrate the compressed cache design with a RISC-V processor core on an FPGA. We implement the Flush-Reload attack and find that the impact of the attack on a compressed cache scheme is likely to be weaker than that of an uncompressed design. To the best of our knowledge, this is the first attempt at understanding the role of side-channel attacks on a compressed cache design in hardware. We further explore the possibility of using a variable clock logic and observe that it reduces the effectiveness of the attack by 30 to 50%. However, this scheme could impact the cache performance by up to 2.9 times.