Valentin Martinoli, Y. Teglia, Abdellah Bouagoun, R. Leveugle
{"title":"基于裸金属微架构隐蔽通道的CVA6 RISC-V CPU信息恢复","authors":"Valentin Martinoli, Y. Teglia, Abdellah Bouagoun, R. Leveugle","doi":"10.1109/IOLTS56730.2022.9897297","DOIUrl":null,"url":null,"abstract":"In this work, we study the micro architectural vulnerabilities of the open-source RISC-V CPU named CVA6. We build a realistic scenario for extracting information and propose an analysis on how to reduce the impact of noise on the attack, while staying as close as possible to hardware level through baremetal simulations.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Recovering Information on the CVA6 RISC-V CPU with a Baremetal Micro-Architectural Covert Channel\",\"authors\":\"Valentin Martinoli, Y. Teglia, Abdellah Bouagoun, R. Leveugle\",\"doi\":\"10.1109/IOLTS56730.2022.9897297\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we study the micro architectural vulnerabilities of the open-source RISC-V CPU named CVA6. We build a realistic scenario for extracting information and propose an analysis on how to reduce the impact of noise on the attack, while staying as close as possible to hardware level through baremetal simulations.\",\"PeriodicalId\":274595,\"journal\":{\"name\":\"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IOLTS56730.2022.9897297\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOLTS56730.2022.9897297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
本文主要研究开源RISC-V CPU CVA6的微架构漏洞。我们构建了一个真实的信息提取场景,并提出了如何减少噪声对攻击的影响的分析,同时通过裸机模拟尽可能接近硬件水平。
Recovering Information on the CVA6 RISC-V CPU with a Baremetal Micro-Architectural Covert Channel
In this work, we study the micro architectural vulnerabilities of the open-source RISC-V CPU named CVA6. We build a realistic scenario for extracting information and propose an analysis on how to reduce the impact of noise on the attack, while staying as close as possible to hardware level through baremetal simulations.