6.888 Secure Hardware Design

Fall 2020

Schedule (tentative)

Part 1: Introduction

Date Topic Speaker Reading Notes
9/2 (Wed) Introduction Mengjia pdf
split-pdf
9/7 (Mon) Labor Day — No Class
9/9 (Wed) Secure Processors in Industry Mengjia Costan et al. Intel SGX Explained. IACR. 2016.
The entire paper provides good information, but our discussion will focus on the following sections:
  • Section 2: a good refresher on computer architecture and related information specific to Intel processors
  • Section 3.4-3.8: summary of relevant attacks on secure hardware
  • Section 5-5.3: basic SGX programming model
pdf
split-pdf
9/14 (Mon) SGX Mengjia pdf
split-pdf

Part 2: Micro-architectural Side Channel

Date Topic Speaker Reading Notes
9/16 (Wed) Micro-architectural Side Channel Mengjia Kiriansky et al. DAWG: A defense against cache timing attacks in speculative execution processors. MICRO. 2018.
Optional: Qian et al. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering (2018).
pdf
split-pdf
9/21 (Mon) Traditional Side Channels Mengjia Percival, Colin. Cache missing for fun and profit. (2005).
Optional: Yarom et al. FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. USENIX Security. 2014.
Liu et al. Last-level cache side-channel attacks are practical. S&P, 2015.
pdf
split-pdf
Lab Assigned
9/23 (Wed) Transient Execution Attacks Mengjia Kocher et al. Spectre attacks: Exploiting speculative execution. S&P. 2019.
Optional: Canella et al. A systematic evaluation of transient execution attacks and defenses. USENIX Security. 2019.
pdf
split-pdf
9/28 (Mon) Hardware to Enforce Non-interference Mengjia Tiwari et al. Complete information flow tracking from the gates up. ASPLOS. 2009.
Optional: Ferraiuolo et al. HyperFlow: A processor architecture for nonmalleable, timing-safe information flow security. CCS. 2018.
pdf
split-pdf
9/30 (Wed) Transient Execution Defenses Lindsey Yu et al. Speculative Taint Tracking (STT) A Comprehensive Protection for Speculatively Accessed Data. MICRO. 2019.
Optional: Guarnieri et al. Hardware-Software Contracts for Secure Speculation. arXiv preprint. 2020.
pdf
10/5 (Mon) Oblivious programming Mengjia Cauligi et al. FaCT: a DSL for timing-sensitive computation. PLDI. 2019.
Optional: Cauligi et al. Constant-Time Foundations for the New Spectre Era. PLDI. 2020.
pdf
10/7 (Wed) Randomization Peter Bourgeat et al. CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches. MICRO. 2020.
Optional: Moinuddin K. Qureshi. New Attacks and Defense for Encrypted-Address Cache. ISCA. 2019
pdf
Proposal Due on 10/9 (Fri)

Part 3: Enclaves

Date Topic Speaker Reading Notes
10/12(Mon) → 10/13(Tue) Enclave Side Channel Mengjia Skarlatos et al. MicroScope: enabling microarchitectural replay attacks. ISCA. 2019.
Optional: Wang et al. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX. CCS. 2017.
pdf
10/14 (Wed) Hardware enclave design Damian Bourgeat et al. MI6: Secure enclaves in a speculative out-of-order processor. MICRO. 2019.
Optional: Lebedev et al. Sanctorum: A lightweight security monitor for secure enclaves.DATE. 2019.
pdf
Lab Due
10/19 (Mon) Enclave Programmability Vighnesh Lind et al. Glamdring: Automatic application partitioning for intel SGX. USENIX ATC. 2017.
Optional: Park et al. Nested Enclave: Supporting Fine-grained Hierarchical Isolation with SGX. ISCA. 2020.
pdf

Part 4: Opensource Hardware and Verification

Date Topic Speaker Reading Notes
10/21 (Wed) Opensource TEE Miles Lee et al. Keystone: An open framework for architecting trusted execution environments. EuroSys. 2020.
Optional: Johnson et al. Titan: enabling a transparent silicon root of trust for Cloud. Hot Chips. 2018.
pdf
10/26 (Mon) ISA Brandon Yu et al. Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. NDSS. 2019.
Optional: Zagieboylo et al. Using information flow to design an ISA that controls timing channels. CSF, 2019.
pdf
10/28 (Wed) Attack Synthesis Thomas Trippel et al. CheckMate: Automated Synthesis ofHardware Exploits and Security Litmus Tests MICRO. 2018.
Optional: Zhang et al. End-to-end automated exploit generation for validating the security of processor designs. MICRO. 2018.
11/2 (Mon) Verification for Side Channel Vulnerability Jack Athalye et al. Notary: a device for secure transaction approval. SOSP. 2019.
Optional: Guarnieri et al. Spectector: Principled Detection of Speculative Information Flows SP. 2020.
pdf

Part 5: Physical Attacks

Date Topic Speaker Reading Notes
11/4 (Wed) Power Side Channel Maitreyi Zhao et al. FPGA-based remote power side-channel attacks. S&P. 2018. Optional: Fei et al. A Statistics-based Fundamental Model for Side-channel Attack Analysis. IACR. 2014.
pdf
11/9 (Mon) Rowhammer Jongchan Mutlu et al. RowHammer: A retrospective. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2019).
Optional: Kim et al. Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques. ISCA. 2020.
pdf
11/11 (Wed) Veterans Day — No Class Submit midterm project presentation slides instead of weekly report by Sunday (11/15).
11/16 (Mon) Modern Rowhammer Erik Kwong et al. Rambleed: Reading bits in memory without accessing them. S&P. 2020.
Optional: Islam et al. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks." USENIX. 2019.
pdf
11/18 (Wed) Rowhammer Defense Miles Park et al. Graphene: Strong yet Lightweight Row Hammer Protection. MICRO. 2020.
Optional: Cojocar et al. Exploiting correcting codes: On the effectiveness of ECC memory against Rowhammer attacks. S&P. 2019.
Mid-term Report Due on Friday (11/20)
11/23 (Mon) Thanksgiving — No Class
11/25 (Wed) Thanksgiving — No Class No weekly report due this week

Part 6: Memory Safety

Date Topic Speaker Reading Notes
11/30 (Mon) Memory Safety Mengjia Szekeres et al. SoK: Eternal war in memory. S&P. 2013.
Optional: Oleksenko et al. Intel MPX Explained: A Cross-layer Analysis of the Intel MPX System Stack. SIGMETRICS. 2018.
pdf
12/2 (Wed) Randomization Techniques Miles Gallagher et al. Morpheus: a vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn. ASPLOS. 2019. pdf
12/7 (Mon) Cheri-Based Architecture Richard Woodruff et al. The CHERI capability model: Revisiting RISC in an age of risk. ISCA. 2014.
Optional: Xia et al. Cherivoke: Characterising pointer revocation using cheri capabilities for temporal memory safety. MICRO. 2019.
pdf
12/9 (Wed) Final Project Presentations