TY - JOUR
T1 - FENL: an ISE to mitigate analogue micro-architectural leakage
AU - Gao, Si
AU - Marshall, Ben
AU - Page, Daniel
AU - Pham, Thinh H
PY - 2020/3/2
Y1 - 2020/3/2
N2 - Ge et al. [GYH18] propose the augmented ISA (or aISA), a central tenet of which is the selective exposure of micro-architectural resources via a less opaque abstraction than normal. The aISA proposal is motivated by the need for control over such resources, for example to implement robust countermeasures against microarchitectural attacks. In this paper, we apply an aISA-style approach to challenges stemming from analogue micro-architectural leakage; examples include power-based Hamming weight and distance leakage from relatively fine-grained resources (e.g., pipeline registers), which are not exposed in, and so cannot be reliably controlled via, a normal ISA. Specifically, we design, implement, and evaluate an ISE named FENL: the ISE acts as a fence for leakage, preventing interaction between, and hence leakage from, instructions before and after it in program order. We demonstrate that the implementation and use of FENL has relatively low overhead, and represents an effective tool for systematically localising and reducing leakage.
AB - Ge et al. [GYH18] propose the augmented ISA (or aISA), a central tenet of which is the selective exposure of micro-architectural resources via a less opaque abstraction than normal. The aISA proposal is motivated by the need for control over such resources, for example to implement robust countermeasures against microarchitectural attacks. In this paper, we apply an aISA-style approach to challenges stemming from analogue micro-architectural leakage; examples include power-based Hamming weight and distance leakage from relatively fine-grained resources (e.g., pipeline registers), which are not exposed in, and so cannot be reliably controlled via, a normal ISA. Specifically, we design, implement, and evaluate an ISE named FENL: the ISE acts as a fence for leakage, preventing interaction between, and hence leakage from, instructions before and after it in program order. We demonstrate that the implementation and use of FENL has relatively low overhead, and represents an effective tool for systematically localising and reducing leakage.
U2 - 10.13154/tches.v2020.i2.73-98
DO - 10.13154/tches.v2020.i2.73-98
M3 - Article (Academic Journal)
SN - 2569-2925
VL - 2020
SP - 73
EP - 98
JO - IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)
JF - IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)
IS - 2
ER -