MCU-Wide Timing Side Channels and Their Detection

Johannes Müller,Anna Lena Duque Antón,Lucas Deutschmann,Dino Mehmedagić,Cristiano Rodrigues,Daniel Oliveira,Keerthikumara Devarajegowda,Mohammad Rahmani Fadiheh,Sandro Pinto,Dominik Stoffel,Wolfgang Kunz
DOI: https://doi.org/10.1145/3649329.3656541
2024-07-18
Abstract:Microarchitectural timing side channels have been thoroughly investigated as a security threat in hardware designs featuring shared buffers (e.g., caches) or parallelism between attacker and victim task execution. However, contradicting common intuitions, recent activities demonstrate that this threat is real even in microcontroller SoCs without such features. In this paper, we describe SoC-wide timing side channels previously neglected by security analysis and present a new formal method to close this gap. In a case study on the RISC-V Pulpissimo SoC, our method detected a vulnerability to a previously unknown attack variant that allows an attacker to obtain information about a victim's memory access behavior. After implementing a conservative fix, we were able to verify that the SoC is now secure w.r.t. the considered class of timing side channels.
Cryptography and Security
What problem does this paper attempt to address?