ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions
2022Conference / Journal
Authors
Tim Güneysu Nils Pohl Pierre Mayr Dominic Funke Christian Niesler Lucas Davi Gregor Leander Jan Philipp Thoma
Research Hub
Research Hub B: Eingebettete Sicherheit
Research Hub C: Sichere Systeme
Research Challenges
RC 6: Next-Generation Implementation Security
RC 7: Building Secure Systems
Abstract
In the recent past, we have witnessed the shift towards attacks on the microarchitectural CPU level. In particular, cache side-channels play a predominant role as they allow an attacker to exfiltrate secret information by exploiting the CPU microarchitecture. These subtle attacks exploit the architectural visibility of conflicting cache addresses. In this paper, we present ClepsydraCache, which mitigates state-of-the-art cache attacks using a novel combination of cache decay and index randomization. Each cache entry is linked with a Time-To-Live (TTL) value. We propose a new dynamic scheduling mechanism of the TTL which plays a fundamental role in preventing those attacks while maintaining performance. ClepsydraCache efficiently protects against the latest cache attacks such as Prime+(Prune+)Probe. We present a full prototype in gem5 and lay out a proof-of-concept hardware design of the TTL mechanism, which demonstrates the feasibility of deploying ClepsydraCache in real-world systems.