Author:
Guo Pengfei,Yan Yingjian,Ye Bin,Zhu Chunsheng,Zhang Lichao,Shen Ting,Chen Lin
Abstract
Cache attacks exploit the hardware vulnerabilities inherent to modern processors and pose a new threat to Internet of Things (IoT) devices. Intuitively, different cache parameter configurations directly impact the attack effectiveness, but the current research on this issue is not systematic or comprehensive enough. This paper’s primary focus is to evaluate how different cache parameter configurations affect access-driven attacks. We build a flexible and configurable simulation verification environment based on the Chipyard framework. To reduce the interference of other factors, we established a baseline for each category of parameter evaluation. We propose a novel evaluation model, called Key Score Scissors Differential (KSSD), for evaluating common private and shared cache parameters under the local and cross-core attack models, respectively; among these are private cache replacement policy, private cache capacity, cache line size, private cache associativity, shared cache capacity, and shared cache associativity. Ours is the first evaluation of the shared cache under a cross-core attack model. As a result of the evaluation, the quantitative metrics can provide a reliable indication of information leakage level under the current cache configuration, which is helpful for attackers, defenders, and evaluators. Furthermore, we provide detailed explanations and discussions of inconsistent findings by comparing our results with the existing literature.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference51 articles.
1. Current research on Internet of Things (IoT) security: A survey
2. Analytical Review of Cybersecurity for Embedded Systems
3. Security Issues in IIoT: A Comprehensive Survey of Attacks on IIoT and Its Countermeasures;Panchal;Proceedings of the 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN),2018
4. Security Attacks in IoT: A Survey;Deogirikar;Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC),2017
5. IoT Hardware-Based Security: A Generalized Review of Threats and Countermeasures;Higgins,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献