Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors
By: Cédrick Austa, Jan Tobias Mühlberg, Jean-Michel Dricot
Potential Business Impact:
Finds hidden security flaws in computer chips.
While interest in the open RISC-V instruction set architecture is growing, tools to assess the security of concrete processor implementations are lacking. There are dedicated tools and benchmarks for common microarchitectural side-channel vulnerabilities for popular processor families such as Intel x86-64 or ARM, but not for RISC-V. In this paper we describe our efforts in porting an Intel x86-64 benchmark suite for cache-based timing vulnerabilities to RISC-V. We then use this benchmark to evaluate the security of three commercially available RISC-V processors, the T-Head C910 and the SiFive U54 and U74 cores. We observe that the C910 processor exhibits more distinct timing types than the other processors, leading to the assumption that code running on the C910 would be exposed to more microarchitectural vulnerability sources. In addition, our evaluation reveals that $65.9\%$ of the vulnerabilities covered by the benchmark exist in all processors, while only $6.8\%$ are absent from all cores. Our work, in particular the ported benchmark, aims to support RISC-V processor designers to identify leakage sources early in their designs and to support the development of countermeasures.
Similar Papers
Efficient Trace for RISC-V: Design, Evaluation, and Integration in CVA6
Hardware Architecture
Helps computers find bugs by watching instructions.
Pre-cache: A Microarchitectural Solution to prevent Meltdown and Spectre
Cryptography and Security
Stops hackers from stealing secrets from computers.
Microarchitecture Design and Benchmarking of Custom SHA-3 Instruction for RISC-V
Hardware Architecture
Makes computers faster at scrambling secret messages.