On the Balance Between the Performance and Security of Modern Processor Micro-architectures

dc.contributor.advisorLin, Wei-Ming
dc.contributor.authorHernandez Coronado, Andres Rainiero
dc.contributor.committeeMemberKrishnan, Ram
dc.contributor.committeeMemberJohn, Eugene
dc.contributor.committeeMemberPrevost, Jeff
dc.date.accessioned2024-02-09T22:25:04Z
dc.date.available2022-11-12
dc.date.available2024-02-09T22:25:04Z
dc.date.issued2022
dc.descriptionThis item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID.
dc.description.abstractWith a never-ending task to increase performance, hardware vendors often overlook how the design of a new micro-architecture can include bugs exploitable by devoted adversaries, which can be used to violate the security guarantees that users take for granted in modern computing systems. Therefore, in this work I take an adversarial role with the task of pinpointing as many security flaws as possible in multiple x86-64 processors implementing recent micro-architecture designs, from both Intel and AMD, where I attempt to propose any mitigation where possible. As a brief introduction, I first report about how recent efforts by AMD fall short in their task to mitigate cache side-channels techniques in their recent Zen micro-architecture. Then, as a counter example, I propose The Race-Timing prototype, a new software-based technique, agnostic to the micro-architecture, that can configure effective cache-side channels in any modern processor that implements multi-threading. Following, I disclose Branchboozle, a new attack on the branch prediction unit of modern processors, from both Intel and AMD, capable of consistently triggering the now-infamous Spectre bug. Finally, I pay close attention to the memory management unit of recent Intel processors, which can be exploited to mount advanced forms of cache side-channel attacks known as Xlate. Yet, while hard to mitigate, the original implementation of Xlate is considerably slower when compared to other techniques, thus, I propose The TLB Mage, a comprehensive framework that accelerates Xlate attacks in general. Ultimately, throughout this dissertation it will become apparent how there will never be an end to this line of research, where I will always try to point out security flaws in each new micro-architecture design. Nonetheless, doing so only benefits the end-users of modern computing systems, who can now be certain that work is being done to improve their security and privacy.
dc.description.departmentElectrical and Computer Engineering
dc.format.extent159 pages
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://hdl.handle.net/20.500.12588/3976
dc.languageen
dc.subjectBranch Prediction
dc.subjectCache Side-channels
dc.subjectMemory Management Unit
dc.subjectTranslation Lookaside Buffer
dc.subject.classificationComputer engineering
dc.titleOn the Balance Between the Performance and Security of Modern Processor Micro-architectures
dc.typeThesis
dc.type.dcmiText
dcterms.accessRightspq_closed
thesis.degree.departmentElectrical and Computer Engineering
thesis.degree.grantorUniversity of Texas at San Antonio
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
HernandezCoronado_utsa_1283D_13589.pdf
Size:
1.94 MB
Format:
Adobe Portable Document Format