Hardware-Based FLUSH+RELOAD Attack on Armv8 System via ACP

Heemin Lee, Sungyeong Jang, Han Yee Kim, Taeweon Suh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cache side-channel attacks have been getting remarked as it threatens the information security of the multitenant systems. Among them, the FLUSH+RELOAD attack is one of the high-accuracy and high-resolution cache side-channel attacks. However, there have been few works targeting Arm architecture due to its architectural differences from x86 processors such as accessibility of cache flush instruction. In this paper, we design hardware that allows unprivileged cache invalidation on Arm processor through ACP. By utilizing the developed IP, we demonstrate a FLUSH+RELOAD attack on T table-based AES in unprivileged user mode. Our suggestion shows better performance than previous studies using cache flush instruction.

Original languageEnglish
Title of host publication35th International Conference on Information Networking, ICOIN 2021
PublisherIEEE Computer Society
Pages32-35
Number of pages4
ISBN (Electronic)9781728191003
DOIs
Publication statusPublished - 2021 Jan 13
Event35th International Conference on Information Networking, ICOIN 2021 - Jeju Island, Korea, Republic of
Duration: 2021 Jan 132021 Jan 16

Publication series

NameInternational Conference on Information Networking
Volume2021-January
ISSN (Print)1976-7684

Conference

Conference35th International Conference on Information Networking, ICOIN 2021
CountryKorea, Republic of
CityJeju Island
Period21/1/1321/1/16

Keywords

  • ACP
  • Arm
  • Cache side-channel attacks
  • and FPGA

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Hardware-Based FLUSH+RELOAD Attack on Armv8 System via ACP'. Together they form a unique fingerprint.

Cite this