Gururaj Saileshwar - Micro-Architectural Side-Channel Attacks and Defenses [25 Sep 2023]

Описание к видео Gururaj Saileshwar - Micro-Architectural Side-Channel Attacks and Defenses [25 Sep 2023]

This talk is part of the CrySP Speaker Series on Privacy. For more information and to view other talks in the series, go to: https://crysp.uwaterloo.ca/speakers/

Micro-Architectural Side-Channel Attacks and Defenses: CPU Caches,
Schedulers, and Beyond!

Gururaj Saileshwar, University of Toronto
September 25, 2023

Abstract:
In recent years, micro-architectural side-channels have emerged as a unique
and potent threat to security and privacy of systems. Identifying these side-
channels is difficult as they originate from structures which are often
undocumented and hidden from the software. Moreover, they originate from
crucial hardware performance optimizations, making low overhead mitigations
challenging. This talk will focus on both discovery of new attacks and new low-
cost defenses.

First, I will discuss cache-side-channel attacks and defenses, focusing on set-
conflict based cache side-channels like Prime + Probe. Such attacks can leak
keys from encryption algorithms, cause privacy breaches including user activity
fingerprinting, etc. Recently, many randomized cache defenses have been
proposed as mitigations, but they have been broken by adaptive attacks. To
fundamentally address this problem, we propose MIRAGE [SEC’21], a
randomized cache defense that eliminates set-conflicts with an abstraction of
a fully associative cache. It achieves this practically with set-associative caches
using Power-of-2-Choices-based indexing. MIRAGE makes set-conflicts
improbable in system lifetime to eliminate such attacks at less than 2%
slowdown.
While 2018 to 2020 saw 5 different defenses broken by 6 new attacks,
MIRAGE has remained unbroken since 2020.

Next, I will discuss a new side-channel vulnerability we discovered in AMD
CPUs (Zen 2 & 3, EPYC 1st-3rd generation), called SQUIP [SP’23].
This work discovered the existence of shared scheduler queues in multi-
threaded AMD CPUs, which have been relatively unexplored. We reverse-
engineered these structures and demonstrated a side-channel attack
exploiting CPU scheduler queue contention that can leak a 4096-bit RSA key
across SMT-threads. The vulnerability was acknowledged by AMD and
assigned a CVE-2021- 46778. We will also discuss mitigations in this talk.

Finally, I will conclude with a brief description of on-going work on automated
tools for side-channel detection, making ML models resilient to micro-
architectural attacks, and more.

Bio:
Gururaj Saileshwar is an Assistant Professor in the University of Toronto, Dept
of Computer Science. His research bridges computer architecture and systems
security, with interests including micro-architectural side-channels, DRAM
Rowhammer attacks, trusted execution environments, and memory safety.
Saileshwar’s work has been awarded an IEEE HPCA Best Paper Award, an IEEE
Micro Top Picks Honorable Mention, and his dissertation has been recognized
with an IEEE HOST Best PhD Dissertation Award and an IEEE TCCA / ACM
SIGARCH Best Dissertation Award Honorable Mention. His work appears in top
computer architecture and systems venues like ASPLOS, MICRO, HPCA, ISCA,
and security venues like USENIX Security, S&P and CCS.

Комментарии

Информация по комментариям в разработке