DocumentCode
1799883
Title
A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
Author
Callan, Robert ; Zajic, Alenka ; Prvulovic, Milos
Author_Institution
Georgia Inst. of Technol., Atlanta, GA, USA
fYear
2014
fDate
13-17 Dec. 2014
Firstpage
242
Lastpage
254
Abstract
This paper presents a new metric, which we call Signal Available to Attacker (SAVAT), that measures the side channel signal created by a specific single-instruction difference in program execution, i.e. The amount of signal made available to a potential attacker who wishes to decide whether the program has executed instruction/event A or instruction/event B. We also devise a practical methodology for measuring SAVAT in real systems using only user-level access permissions and common measurement equipment. Finally, we perform a case study where we measure electromagnetic (EM) emanations SAVAT among 11 different instructions for three different laptop systems. Our findings from these experiments confirm key intuitive expectations, e.g. That SAVAT between on-chip instructions and off-chip memory accesses tends to be higher than between two on-chip instructions. However, we find that particular instructions, such as integer divide, have much higher SAVAT than other instructions in the same general category (integer arithmetic), and that last-level-cache hits and misses have similar (high) SAVAT. Overall, we confirm that our new metric and methodology can help discover the most vulnerable aspects of a processor architecture or a program, and thus inform decision-making about how to best manage the overall side channel vulnerability of a processor, a program, or a system.
Keywords
cryptography; decision making; program processors; SAVAT; decision-making; electromagnetic emanation measurement; instruction-level events; laptop systems; measurement equipment; off-chip memory accesses; on-chip instructions; processor architecture; program execution; side channel vulnerability; side-channel signal available to attacker; single-instruction difference; Area measurement; Frequency measurement; Instruments; Measurement errors; Measurement uncertainty; Time measurement; EM emanations; computer security; measurements; metrics; side channel; vulnerability assessment;
fLanguage
English
Publisher
ieee
Conference_Titel
Microarchitecture (MICRO), 2014 47th Annual IEEE/ACM International Symposium on
Conference_Location
Cambridge
ISSN
1072-4451
Type
conf
DOI
10.1109/MICRO.2014.39
Filename
7011392
Link To Document