researchers mitigate potential side-channel attack vulnerability in multicore processors
MIT researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. Credit: Jose-Luis Olivares, MIT

A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer, MIT researchers have found.

Modern computer processors contain many computing units, called cores, which share the same hardware resources. The on-chip interconnect is the component that enables these cores to communicate with each other. But when programs on multiple cores run simultaneously, there is a chance they can delay one another when they use the interconnect to send data across the chip at the same time.

By monitoring and measuring these delays, a malicious agent could conduct what is known as a “side-channel attack” and reconstruct secret information that is stored in a program, such as a cryptographic key or password.

MIT researchers reverse-engineered the on-chip interconnect to study how this kind of attack would be possible. Drawing on their discoveries, they built an analytical model of how traffic flows between the cores on a processor, which they used to design and launch surprisingly effective side-channel attacks. Then they developed two mitigation strategies that enable a user to improve security without making any physical changes to the computer chip.

“A lot of current side-channel defenses are ad hoc—we see a little bit of leakage here and we patch it. We hope our approach with this analytical model pushes more systematic and robust defenses that eliminate whole classes of attacks at the same time,” says co-lead author Miles Dai, MEng ’21.

Dai wrote the paper with co-lead author Riccardo Paccagnella, a graduate student at the University of Illinois at Urbana-Champaign; Miguel Gomez-Garcia ’22; John McCalpin, a research scientist at Texas Advanced Computing Center; and senior author Mengjia Yan, the Homer A. Burnell Career Development Assistant Professor of Electrical Engineering and Computer Science (EECS) and a member of the Computer Science and Artificial Intelligence Laboratory (CSAIL). The research is being presented at the USENIX Security Conference.

Probing processors

A modern processor is like a two-dimensional grid, with multiple cores laid out in rows and columns. Each core has its own cache where data are stored, and there is also a larger cache that is shared across the entire processor. When a program located on one core needs to access data in a cache that is on another core or in the shared cache, it must use the on-chip interconnect to send this request and retrieve the data.

Though it is a large component of the processor, the on-chip interconnect remains understudied because it is difficult to attack, Dai explains. A hacker needs to launch the attack when traffic from two cores is actually interfering with each other, but since traffic spends so little time in the interconnect, it is difficult to time the attack just right. The interconnect is also complex, and there are multiple paths traffic can take between cores.

To study how traffic flows on the interconnect, the MIT researchers created programs that would intentionally access memory caches located outside their local cores.

“By testing out different situations, trying different placements, and swapping out locations of these programs on the processor, we can understand what the rules are behind traffic flows on the interconnect,” Dai says.

They discovered that the interconnect is like a highway, with multiple lanes going in every direction. When two traffic flows collide, the interconnect uses a priority arbitration policy to decide which traffic flow gets to go first. More “important” requests take precedence, like those from programs that are critical to a computer’s operations.

Using this information, the researchers built an analytical model of the processor that summarizes how traffic can flow on the interconnect. The model shows which cores would be most vulnerable to a side-channel attack. A core would be more vulnerable if it can be accessed through many different lanes. An attacker could use this information to select the best core to monitor to steal information from a victim program.

“If the attacker understands how the interconnect works, they can set themselves up so the execution of some sensitive code would be observable through interconnect contention. Then they can extract, bit by bit, some secret information, like a cryptographic key,” Paccagnella explains.

Effective attacks

When the researchers used this model to launch side-channel attacks, they were surprised by how quickly the attacks worked. They were able to recover full cryptographic keys from two different victim programs.

After studying these attacks, they used their analytical model to design two mitigation mechanisms.

In the first strategy, the system administrator would use the model to identify which cores are most vulnerable to attacks and then schedule sensitive software to run on less vulnerable cores. For the second mitigation strategy, the administrator could reserve cores located around a susceptible program and run only trusted software on those cores.

The researchers found that both mitigation strategies were able to significantly reduce the accuracy of side-channel attacks. Neither requires the user to make any changes to the physical hardware, so the mitigations would be relatively easy to implement, Dai says.

Ultimately, they hope their work inspires more researchers to study the security of on-chip interconnects, Paccagnella says.

“We hope this work highlights how the on-chip interconnect, which is such a large component of computer processors, remains an overlooked attack surface. In the future, as we build systems that have stronger isolation properties, we should not ignore the interconnect,” he adds. More information: Don’t Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. people.csail.mit.edu/mengjia/d … Attack_USENIX_22.pdf Provided by Massachusetts Institute of Technology

This story is republished courtesy of MIT News (web.mit.edu/newsoffice/), a popular site that covers news about MIT research, innovation and teaching.

Citation: Researchers mitigate potential side-channel attack vulnerability in multicore processors (2022, August 11) retrieved 11 August 2022 from https://techxplore.com/news/2022-08-mitigate-potential-side-channel-vulnerability-multicore.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

TECH NEWS RELATED

Optus Confirms Data Breach; 2.1 Million Government ID Numbers are Exposed

Australian Telecommunications Company revealed the extent of a massive data breach that targeted personal information, resulting from an attack by an anonymous user. The Guardian reports that the telco claims that around 150,000 passport and 50,000 Medicare numbers were stolen after an external review was conducted. What The People ...

View more: Optus Confirms Data Breach; 2.1 Million Government ID Numbers are Exposed

Spotlight on synthetic tissues and mRNA for chemistry Nobel

Pieter Cullis, Drew Weissman and Katalin Kariko are thought to be among the favourites for the Nobel Chemistry Prize. The development of mRNA vaccines, “bioorthogonal chemistry” or even artificial skin are some of the discoveries tipped for the Nobel Chemistry Prize announced Wednesday, which experts see as a toss-up. ...

View more: Spotlight on synthetic tissues and mRNA for chemistry Nobel

Report: Amazon freezes hiring on corporate retail division

A logo for Amazon is displayed on a screen at the Nasdaq MarketSite, July 27, 2018. Amazon is implementing a hiring freeze on the corporate side of its retail business for the rest of the year. Citing an internal announcement, The New York Times reported Tuesday, Oct. 4, 2022, ...

View more: Report: Amazon freezes hiring on corporate retail division

Musk offers to close Twitter buyout deal at original price

Elon Musk’s potential stewardship of Twitter has sparked worry from activists, who fear he could open the gates to abusive and misinformative posts. Elon Musk on Tuesday offered to push through with his buyout of Twitter at the original agreed price, as a trial over his efforts to withdraw ...

View more: Musk offers to close Twitter buyout deal at original price

Amid Ukraine war, US set to fly Russian cosmonaut to ISS

Blast-off for the SpaceX Crew5 mission is set for noon from the Kennedy Space Center, with the weather forecast so far promising. The United States will on Wednesday carry a Russian to the International Space Station aboard a SpaceX ship, in a voyage that carries symbolic significance amid the ...

View more: Amid Ukraine war, US set to fly Russian cosmonaut to ISS

Nobel physics winner wanted to topple quantum theory he vindicated

US physicist John Clauser poses in his home in Walnut Creek, California, on October 4, 2022, after winning the Nobel Prize for physics. American physicist John Clauser won the 2022 Nobel Prize for a groundbreaking experiment vindicating quantum mechanics—a fundamental theory governing the subatomic world that is today the ...

View more: Nobel physics winner wanted to topple quantum theory he vindicated

Researchers examine the complex interactions between timber, logging, and forest elephants

Credit: CC0 Public Domain Forest elephant populations have been seriously declining for decades. In a recent and extensive literature review published in Mammal Review, investigators describe the impacts of logging in central Africa on forest elephant populations, and conversely, the role of forest elephants in timber species’ dynamics. Existing ...

View more: Researchers examine the complex interactions between timber, logging, and forest elephants

You're a winner: Listening in on 'the call' for Nobel Prize

A Nobel medal displayed during a ceremony in New York, Tuesday, Dec. 8, 2020. Credit: Angela Weiss/Pool Photo via AP, File This is what it’s like to get “the call”—the Swedish Academy of Sciences ringing you up to say you won the Nobel Prize. It’s usually a dream-of-a-lifetime call ...

View more: You're a winner: Listening in on 'the call' for Nobel Prize

Nobel panel to announce winner of chemistry prize

Google Translate app no longer available in China

Elon Musk's Twitter deal has employees asking: Should I stay or should I go?

Meta is Shutting Down News Platform Bulletin

South Korea's Naver acquires US-listed social e-commerce marketplace Poshmark for $1.2B

Amazon Freezes Corporate Retail Hiring for the Rest of the Year

White House Office of Science and Technology Policy Releases Blueprint for an AI Bill of Rights

After iPhones, Apple to shift production of AirPods, Beats headphone to India

US's Anchorage Digital expands in Asia with five new institutional partners

You Can Use Alexa to Keep You Updated on Amazon Prime Early Access Deals

Windows 11 2022 Update Slows Transfers by 40%—How to Speed It Up?

Amazon Prime Early Access Sale 2022: Kindle Paperwhite Signature Edition Essentials Bundle Deals You Can Check Out Now

OTHER TECH NEWS

Top Car News Car News