引用本文
  • 孟令佳,林璟锵,郑昉昱,郎帆,王名宇.瞬态执行攻击及其对软件密码实现安全增强方案的影响研究[J].信息安全学报,已采用    [点击复制]
  • Meng Lingjia,Lin Jingqiang,Zheng Fangyu,Lang Fan,Wang Mingyu.Research on Transient Execution Attacks and Their Impact on Security Enhanced Software Cryptographic Implementation Schemes[J].Journal of Cyber Security,Accept   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

过刊浏览    高级检索

本文已被:浏览 1645次   下载 75  
瞬态执行攻击及其对软件密码实现安全增强方案的影响研究
孟令佳1, 林璟锵2, 郑昉昱1, 郎帆1, 王名宇1
0
(1.中国科学院信息工程研究所信息安全国家重点实验室;2.中国科学技术大学网络空间安全学院)
摘要:
现代处理器一般采用了乱序执行和预测执行等优化技术来提高其运行性能,然而以Meltdown和Spectre为代表的瞬态执行攻击可以利用这些特性所产生的瞬态执行效果,来改变微架构状态,并进一步通过Cache隐蔽信道对秘密数据进行非授权获取。瞬态执行攻击目前已经发展出数十个攻击变种,影响到大量的处理器、操作系统以及云服务提供商,严重威胁计算机系统中的敏感数据安全,特别是软件密码实现中的密钥数据。而在瞬态执行攻击爆发之前,对于软件密码实现所面临的各种内存信息泄露攻击的传统威胁,研究人员早已提出了多种形式的软件密码实现安全增强方案,这些方案借助于不同的处理器组件或者硬件特性,有效地保护密钥等敏感数据以抵抗内存信息泄露。然而,针对新型的瞬态执行攻击,这些安全增强方案的防护效果尚未得到足够的关注。因此,本文旨在研究瞬态执行攻击对软件密码实现安全增强方案的影响和挑战。本文首先对瞬态执行攻击进行研究,介绍其漏洞成因、攻击手法以及具体攻击实例;然后对各种软件密码实现安全增强方案进行总结,明确其核心安全机制;最后,文章全面地讨论和分析软件密码实现安全增强方案对各个瞬态执行攻击实例的防护效果,并从瞬态执行漏洞防御以及安全增强方案设计等角度提出几点意见,从而降低瞬态执行攻击对软件密码实现的威胁。
关键词:  瞬态执行攻击  微架构  乱序执行  预测执行  软件密码实现安全增强
DOI:10.19363/J.cnki.cn10-1380/tn.2024.08.02
投稿时间:2022-09-25修订日期:2023-01-11
基金项目:国家重点研发计划
Research on Transient Execution Attacks and Their Impact on Security Enhanced Software Cryptographic Implementation Schemes
Meng Lingjia1, Lin Jingqiang2, Zheng Fangyu1, Lang Fan1, Wang Mingyu1
(1.State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academic of Sciences;2.School of Cyber Science and Technology , University of Science and Technology of China)
Abstract:
Modern processors generally employ a variety of optimization techniques to improve their performance, including out-of-order execution and speculative execution. However, transient execution attacks represented by Meltdown and Spectre can take advantage of the transient execution effects caused by these features to change the microarchitecture state, and further conduct unauthorized access to secret data through the cache covert channel. Transient execution at-tacks have developed dozens of attack variants, affecting a large number of processors, operating systems and cloud ser-vice providers, seriously threatening the security of sensitive data in computer systems, especially the cryptographic key in software cryptographic implementations. Before the outbreak of the transient execution attacks, in order to deal with the traditional threats of various memory information disclosure attacks faced by software cryptographic implementa-tions, researchers have already proposed various forms of security enhanced software cryptographic implementation schemes. These schemes rely on different processor components or hardware characteristics to effectively protect sensi-tive data such as cryptographic keys against memory disclosure attacks. However, the effectiveness of these security enhancement schemes against the novel transient execution attacks have not received much enough attention. Therefore, we aim to study the impact and challenges of transient execution attacks on security enhanced software cryptographic implementation schemes in this paper. We firstly survey the transient execution attack, introduces its vulnerability caus-es, attack methods and specific attack instances. Then, we summarize various security enhanced software cryptographic implementation schemes, and clarify their fundamental security mechanism. Finally, we comprehensively discuss and analyze the effectiveness of the security enhanced software cryptographic implementation schemes against each transient execution attack instance, and put forward some suggestions from the perspective of hardware vulnera-bility defense and security enhancement scheme design, so as to reduce the threat of transient execution attacks on software cryptographic implementation.
Key words:  transient execution attack  microarchitecture  out-of-order execution  speculative execution  security enhanced software cryptographic implementation