Hardware-Based FLUSH+RELOAD Attack on Armv8 System via ACP

Heemin Lee, Sungyeong Jang, Han Yee Kim, Taeweon Suh

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)

    Abstract

    Cache side-channel attacks have been getting remarked as it threatens the information security of the multitenant systems. Among them, the FLUSH+RELOAD attack is one of the high-accuracy and high-resolution cache side-channel attacks. However, there have been few works targeting Arm architecture due to its architectural differences from x86 processors such as accessibility of cache flush instruction. In this paper, we design hardware that allows unprivileged cache invalidation on Arm processor through ACP. By utilizing the developed IP, we demonstrate a FLUSH+RELOAD attack on T table-based AES in unprivileged user mode. Our suggestion shows better performance than previous studies using cache flush instruction.

    Original languageEnglish
    Title of host publication35th International Conference on Information Networking, ICOIN 2021
    PublisherIEEE Computer Society
    Pages32-35
    Number of pages4
    ISBN (Electronic)9781728191003
    DOIs
    Publication statusPublished - 2021 Jan 13
    Event35th International Conference on Information Networking, ICOIN 2021 - Jeju Island, Korea, Republic of
    Duration: 2021 Jan 132021 Jan 16

    Publication series

    NameInternational Conference on Information Networking
    Volume2021-January
    ISSN (Print)1976-7684

    Conference

    Conference35th International Conference on Information Networking, ICOIN 2021
    Country/TerritoryKorea, Republic of
    CityJeju Island
    Period21/1/1321/1/16

    Bibliographical note

    Publisher Copyright:
    © 2021 IEEE.

    Keywords

    • ACP
    • Arm
    • Cache side-channel attacks
    • and FPGA

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems

    Fingerprint

    Dive into the research topics of 'Hardware-Based FLUSH+RELOAD Attack on Armv8 System via ACP'. Together they form a unique fingerprint.

    Cite this