Performing Cache Timing Attacks from the Reconfigurable Part of a Heterogeneous SoC—An Experimental Study - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Applied Sciences Année : 2021

Performing Cache Timing Attacks from the Reconfigurable Part of a Heterogeneous SoC—An Experimental Study

Lilian Bossuet
El Mehdi Benhani
  • Fonction : Auteur

Résumé

Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in increasing numbers of applications on servers or in the cloud. This type of SoC has two parts: a processing system that includes hard components and ARM processor cores and a programmable logic part that includes logic gates to be used to implement custom designs. The two parts communicate via memory-mapped interfaces. One of these interfaces is the accelerator coherency port that provides optional cache coherency between the two parts. In this paper, we discuss the practicability and potential threat of inside-SoC cache attacks using the cache coherency mechanism of a complex heterogeneous SoC-FPGA. We provide proof of two cache timing attacks Flush+Reload and Evict+Time when SoC-FPGA is targeted, and proof of hidden communication using a cache-based covert channel. The heterogeneous SoC-FPGA Xilinx Zynq-7010 is used as an experimental target.

Dates et versions

hal-03353841 , version 1 (24-09-2021)

Identifiants

Citer

Lilian Bossuet, El Mehdi Benhani. Performing Cache Timing Attacks from the Reconfigurable Part of a Heterogeneous SoC—An Experimental Study. Applied Sciences, 2021, 11 (14), pp.6662. ⟨10.3390/app11146662⟩. ⟨hal-03353841⟩
23 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More