eCommons

 

Efficient and Verifiable Timing Channel Protection for Multi-Core Processors

dc.contributor.authorWang, Yao
dc.contributor.chairSuh, Gookwon Edward
dc.contributor.committeeMemberMyers, Andrew C.
dc.contributor.committeeMemberBatten, Christopher
dc.date.accessioned2017-04-04T20:28:22Z
dc.date.available2017-04-04T20:28:22Z
dc.date.issued2017-01-30
dc.description.abstractModern computing systems are becoming increasingly vulnerable to timing channel attacks that leak confidential information through the timing of microarchitectural events. Many timing channel attacks are caused by the interference between different programs in the shared resources of a multi-core processor. For example, an attacker program's cache lines can be evicted by a victim program, which allows the attacker to infer secret information about the victim. Timing channel attacks pose serious threats to contemporary computing systems because they can bypass traditional defense mechanisms such as access control. Previous studies have even demonstrated a practical timing channel attack to recover the keystrokes of a user in the commercial Amazon EC2 cloud. In this thesis, we explored new timing channel attacks and developed timing channel protection schemes for some of the hardware resources in a multi-core processor. Specifically, we discovered new timing channel attacks in the shared on-chip networks and memory controllers. We proposed multiple protection mechanisms for on-chip networks, caches and memory controllers. Our protection schemes cover three high-level approaches: bi-directional protections, uni-directional protections and protections that trade off security for performance. We evaluate our protection schemes and show that the proposed schemes are effective against timing channel attacks while achieving performance improvements over previous protection schemes. Finally, we implemented some of the protection mechanisms in RTL and used SecVerilog to verify the information flow control in hardware. The results show that the protection mechanisms indeed remove timing channels at the gate level.
dc.identifier.doihttps://doi.org/10.7298/X49K487W
dc.identifier.otherWang_cornellgrad_0058F_10146
dc.identifier.otherhttp://dissertations.umi.com/cornellgrad:10146
dc.identifier.otherbibid: 9906125
dc.identifier.urihttps://hdl.handle.net/1813/47878
dc.language.isoen_US
dc.subjectComputer engineering
dc.subjectComputer science
dc.subjectComputer Architecture
dc.subjectMemory Controller
dc.subjectSecurity
dc.subjectSecVerilog
dc.subjectTiming Channel
dc.subjectcache
dc.titleEfficient and Verifiable Timing Channel Protection for Multi-Core Processors
dc.typedissertation or thesis
dcterms.licensehttps://hdl.handle.net/1813/59810
thesis.degree.disciplineElectrical and Computer Engineering
thesis.degree.grantorCornell University
thesis.degree.levelDoctor of Philosophy
thesis.degree.namePh. D., Electrical and Computer Engineering

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Wang_cornellgrad_0058F_10146.pdf
Size:
2.82 MB
Format:
Adobe Portable Document Format