Buffer reinforcement method and device capable of resisting side channel attack
A side-channel attack and caching technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problem that low-privileged software cannot access high-privileged software system registers or memory, and achieves a wide range of applications and good compatibility. , the effect of small hardware overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0062] This embodiment is basically the same as Embodiment 1, and the main difference is that a unified hardware control bit SC_HARDEN_EN_G is added to control whether to execute a corresponding hardening strategy.
[0063] The implementation steps of the buffer reinforcement method that can resist side channel attacks in this embodiment include:
[0064] 1) Read the unified hardware control bit SC_HARDEN_EN_G; obtain the operation request for the cache, and the cache entry contains the allocator identification ALLOCATOR field; when the operation request is an allocation entry, jump to step 2); when the operation When the request is to access an entry, skip to step 3); when the operation request is to replace an entry, skip to step 4);
[0065] 2) For the operation request allocation entry, if the hardware control bit SC_HARDEN_EN_G is turned on, the allocation cache hardening strategy is executed: fill in the identifier of the currently running software domain of the processo...
Embodiment 3
[0069] This embodiment is basically the same as Embodiment 1, and the main difference is that a hardware control bit SC_HARDEN_EN_TLB corresponding to the cache is added to control whether the cache or a modified cache implements a corresponding hardening strategy.
[0070] The implementation steps of the buffer reinforcement method that can resist side channel attacks in this embodiment include:
[0071] 1) Obtain the operation request for the cache, read the hardware control bit SC_HARDEN_EN_TLB corresponding to the target cache of the current operation request, and the cache entry contains the allocator identification ALLOCATOR field; when the operation request is an allocation entry, jump Execute step 2); when the operation request is to access an entry, skip to step 3); when the operation request is to replace an entry, skip to step 4);
[0072] 2) For the operation request allocation entry, if the hardware control bit SC_HARDEN_EN_TLB is enabled, the allocation cache har...
Embodiment 4
[0076] This embodiment is basically the same as Embodiment 1. The main difference is that the unified hardware control bit SC_HARDEN_EN_G and the hardware control bit SC_HARDEN_EN_TLB corresponding to the cache are added, and the hardware control bit SC_HARDEN_EN_TLB corresponding to the unified hardware control bit cache is used to control the Whether the cache or modified cache implements the corresponding hardening strategy.
[0077] The implementation steps of the buffer reinforcement method that can resist side channel attacks in this embodiment include:
[0078] 1) Read the unified hardware control bit SC_HARDEN_EN_G; obtain the operation request for the cache, read the hardware control bit SC_HARDEN_EN_TLB corresponding to the target cache of the current operation request, and the entry of the cache contains the allocator identification ALLOCATOR field; when the operation When the request is to allocate an entry, skip to step 2); when the operation request is to access ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


