当前位置: X-MOL 学术arXiv.cs.AR › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
arXiv - CS - Hardware Architecture Pub Date : 2021-06-16 , DOI: arxiv-2106.08877
Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique

Side-channel attacks on microprocessors, like the RISC-V, exhibit security vulnerabilities that lead to several design challenges. Hence, it is imperative to study and analyze these security vulnerabilities comprehensively. In this paper, we present a brief yet comprehensive study of the security vulnerabilities in modern microprocessors with respect to side-channel attacks and their respective mitigation techniques. The focus of this paper is to analyze the hardware-exploitable side-channel attack using power consumption and software-exploitable side-channel attacks to manipulate cache. Towards this, we perform an in-depth analysis of the applicability and practical implications of cache attacks on RISC-V microprocessors and their associated challenges. Finally, based on the comparative study and our analysis, we highlight some key research directions to develop robust RISC-V microprocessors that are resilient to side-channel attacks.

中文翻译:

RISC-V 处理器的旁道攻击:当前进展、挑战和机遇

对微处理器的旁道攻击,如 RISC-V,表现出导致若干设计挑战的安全漏洞。因此,全面研究和分析这些安全漏洞势在必行。在本文中,我们简要而全面地研究了现代微处理器中关于侧信道攻击及其各自缓解技术的安全漏洞。本文的重点是分析使用功耗和软件可利用的旁道攻击来操纵缓存的硬件可利用的旁道攻击。为此,我们对缓存攻击对 RISC-V 微处理器及其相关挑战的适用性和实际影响进行了深入分析。最后,基于对比研究和我们的分析,
更新日期:2021-06-17
down
wechat
bug