A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks

Hardware cache prefetching has a profound impact on the memory access pattern of ciphers which are exploited in profiled cache-timing attacks. In this paper, we formally demonstrate that memory access patterns influenced by sequential prefetching and its variant, known as even-odd prefetcher has varying information leakage dependent on the alignment of the underlying tables used in the cipher implementation. This demonstrates that a suitable architecture choice for the hardware prefetcher combined with appropriate memory alignment in software can lead to prefetching architectures which are leakage resilient.

[1]  Chester Rebeiro,et al.  Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks , 2012, 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops.

[2]  Christof Paar,et al.  A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.

[3]  Anne Canteaut,et al.  Understanding cache attacks , 2006 .

[4]  Jean-Loup Baer,et al.  Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors , 2009 .

[5]  Chester Rebeiro,et al.  Cache Timing Attacks on Clefia , 2009, INDOCRYPT.

[6]  David A. Patterson,et al.  Computer Architecture, Fifth Edition: A Quantitative Approach , 2011 .

[7]  David A. Patterson,et al.  Computer Architecture: A Quantitative Approach , 1969 .

[8]  Jean-Pierre Seifert,et al.  A refined look at Bernstein's AES side-channel analysis , 2006, ASIACCS '06.

[9]  Onur Aciiçmez,et al.  An Analytical Model for Time-Driven Cache Attacks , 2007, FSE.

[10]  Chester Rebeiro,et al.  A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers , 2021, Journal of Cryptology.

[11]  Chester Rebeiro,et al.  Profiled Time-Driven Cache Attacks on Block Ciphers , 2015 .

[12]  David A. Patterson,et al.  Computer Architecture - A Quantitative Approach, 5th Edition , 1996 .

[13]  Huaiyu Zhu On Information and Sufficiency , 1997 .

[14]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[15]  Eli Biham,et al.  A Fast New DES Implementation in Software , 1997, FSE.