FENL: an ISE to mitigate analogue micro-architectural leakage
DOI:
https://doi.org/10.13154/tches.v2020.i2.73-98Keywords:
Information leakage, side-channel attack, ISA, ISE, micro-architectureAbstract
Ge et al. [GYH18] propose the augmented ISA (or aISA), a central tenet of which is the selective exposure of micro-architectural resources via a less opaque abstraction than normal. The aISA proposal is motivated by the need for control over such resources, for example to implement robust countermeasures against microarchitectural attacks. In this paper, we apply an aISA-style approach to challenges stemming from analogue micro-architectural leakage; examples include power-based Hamming weight and distance leakage from relatively fine-grained resources (e.g., pipeline registers), which are not exposed in, and so cannot be reliably controlled via, a normal ISA. Specifically, we design, implement, and evaluate an ISE named FENL: the ISE acts as a fence for leakage, preventing interaction between, and hence leakage from, instructions before and after it in program order. We demonstrate that the implementation and use of FENL has relatively low overhead, and represents an effective tool for systematically localising and reducing leakage.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 Si Gao, Ben Marshall, Dan Page and Thinh Pham
This work is licensed under a Creative Commons Attribution 4.0 International License.