DesignTimeRunTime Mapping of SecurityCritical Applications in Heterogeneous MPSo

  • Slides: 34
Download presentation
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSo. Cs Andreas Weichslgartner, Stefan Wildermann, Johannes

Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSo. Cs Andreas Weichslgartner, Stefan Wildermann, Johannes Götzfried, Felix Freiling, Michael Glaß, Jürgen Teich Department of Computer Science Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Germany andreas. weichslgartner@fau. de

 • Number of cores in processors increases • Applications with various non-functional requirements

• Number of cores in processors increases • Applications with various non-functional requirements (e. g. , timing, security) Slide 2

Side-Channel Attacks Task b does RSA: • Uses I-Cache • Uses BIGNUM lib •

Side-Channel Attacks Task b does RSA: • Uses I-Cache • Uses BIGNUM lib • Code dependent on key b a Task a is malicious: • Dummy instructions • Uses I-Cache • Evicts BIGNUM instructions • Measures execution time Side-channel attack in shared resource Aciiçmez, Onur. "Yet another microarchitectural attack: exploiting I-cache. " Proceedings of the 2007 ACM workshop on Computer security architecture. ACM, 2007. Slide 3

Side-Channel Attacks Task B does RSA: • No. C traffic correlated to the key

Side-Channel Attacks Task B does RSA: • No. C traffic correlated to the key Task A is malicious: • Dummy traffic • Measures time to transmit data Side-channel attack in shared resource Yao Wang, G. Edward Suh. "Efficient Timing Channel Protection for On-Chip Networks. " Proceedings of the 2012 Sixth IEEE/ACM International Symposium on Networks-on-Chip. ACM, 2012. Slide 4

Side-Channel Attacks How to prevent interference and side-channel attacks? Slide 5

Side-Channel Attacks How to prevent interference and side-channel attacks? Slide 5

Isolation is the Key • Strict temporal isolation (e. g. , TDMA): t 1

Isolation is the Key • Strict temporal isolation (e. g. , TDMA): t 1 a 2 t 2 a 2 t 1 • Spatial isolation (proposed) a 1 Slide 6

Side-Channel Attacks How to achieve spatial isolation in presence of dynamic application mixes? Slide

Side-Channel Attacks How to achieve spatial isolation in presence of dynamic application mixes? Slide 7

Hybrid Mapping: DAARM Design Space Exploration (DSE) Design Time End-to-End Latency Run Time #

Hybrid Mapping: DAARM Design Space Exploration (DSE) Design Time End-to-End Latency Run Time # Res [1] A. Weichslgartner, D. Gangadharan, S. Wildermann, M. Glaß, and J. Teich. "DAARM: Design-time application analysis and run-time mapping for predictable execution in many-core systems. " In Proceedings of International Conference on Hardware/Software Codesign and System Synthesis. 2014. Slide 8

Intermediate Representation • Option 1: Set the allocated communication bandwidth to 100% {t 1}

Intermediate Representation • Option 1: Set the allocated communication bandwidth to 100% {t 1} r 0 {m 1, m 2} bw=100%; bw=80%; hop≤ 1 {t 2, t 3} r 0 {m {m 33, m 44}} bw=100%; bw=70%; hop≤ 1 {t 4} r 1 Slide 10

Intermediate Representation • Option 2: Shape as intermediate representation Slide 11

Intermediate Representation • Option 2: Shape as intermediate representation Slide 11

What about routing and shapes? Slide 12

What about routing and shapes? Slide 12

Spatially Isolated Mapping • Option 1: optimized mapping for minimal “XY shape” • XY

Spatially Isolated Mapping • Option 1: optimized mapping for minimal “XY shape” • XY routing is implemented in hardware and cannot be modified • XY routing may lead to holes in mapping shape Slide 13

Spatially Isolated Mapping • Option 2: use routing tables • Routing can be kept

Spatially Isolated Mapping • Option 2: use routing tables • Routing can be kept inside a convex region • Rotation invariant • Secure mechanism for programming routing tables is needed • Routers with tables consume more area Slide 14

Spatially Isolated Mapping • Malicious configuration of routing tables may result in: • Sub-optimal

Spatially Isolated Mapping • Malicious configuration of routing tables may result in: • Sub-optimal routing, increased delay • Denial of Service Attacks on PEs • Deadlocks/Livelocks • Redirection of data and illegal access of data • Countermeasures: • Using authentication • Using secure regions and monitoring • Using dedicated and secure Virtual Channel for configuration [1] Arnab Kumar Biswas, S. K. Nandy, Ranjani Narayan, “Router Attack toward No. C-enabled MPSo. C and Monitoring Countermeasures against such Threat. ” Circuits, Systems, and Signal Processing, Springer 2015 [2] Diguet, J. -P. ; Evain, S. ; Vaslin, R. ; Gogniat, G. ; Juin, E, “NOC-centric Security of Reconfigurable So. C. ” In Proc. of Networks-on-Chip, 2007. Slide 15

Attacker Model • Attacker controls one application • No physical access to hardware (e.

Attacker Model • Attacker controls one application • No physical access to hardware (e. g. , RAM dumping or chip probing) • Attacker has knowledge about victim‘s source code, mapping, scheduling • Trusted computing base (TCB): • Hardware • Operating System Slide 16

Shape-Based Design-Time Optimization xmin xmax ymin ymax • Build convex region (depended on routing)

Shape-Based Design-Time Optimization xmin xmax ymin ymax • Build convex region (depended on routing) • Multi-Objective DSE: • Number of PEs: minimize (|#r 1|+|#r 2|…+|holes|) • Width: minimize (xmax-xmin) • Height: minimize (ymax-ymin) • Resources per type: minimize (|#r 1|), minimize (|#r 2|) … Slide 17

Shape-Based Design-Time Optimization • One shape can have several shape incarnations • Rotation and

Shape-Based Design-Time Optimization • One shape can have several shape incarnations • Rotation and flipping of a shape may give equivalent mapping options Slide 18

Run-Time Mapping • During run time, different spatially isolated applications need to be mapped

Run-Time Mapping • During run time, different spatially isolated applications need to be mapped to the architecture Slide 19

Run-Time Mapping • Extended Constraint Graph Embedding: • Backtracking algorithm [1] with 100% bandwidth

Run-Time Mapping • Extended Constraint Graph Embedding: • Backtracking algorithm [1] with 100% bandwidth constraint • First Fit Heuristic: • Map first shape incarnation which does not overlap with any other shape incarnation of another application • Shape incarnations can be computed at design-time or during run-time • Formulation as a Satisfiability Problem (SAT): • Concurrent shape selection and mapping of application • Can also be applied in an incremental way [1] A. Weichslgartner, D. Gangadharan, S. Wildermann, M. Glaß, and J. Teich. "DAARM: Design-time application analysis and run-time mapping for predictable execution in many-core systems. " In Proceedings of International Conference on Hardware/Software Codesign and System Synthesis. 2014. Slide 20

Experimental Results • Integration of spatially isolated mapping into DAARM flow [1] • Java

Experimental Results • Integration of spatially isolated mapping into DAARM flow [1] • Java implementation on Intel i 7 -2600 machine • Opt 4 J [2] for DSE, SAT 4 J [3] as SAT solver • 5 applications from the E 3 S Benchmark [4] • 3 different application mixes • 6 x 6 No. C architecture with 3 different processor types [1] A. Weichslgartner, D. Gangadharan, S. Wildermann, M. Glaß, and J. Teich. "DAARM: Design-time application analysis and run-time mapping for predictable execution in many-core systems. " In Proceedings of International Conference on Hardware/Software Codesign and System Synthesis. 2014. [2] M. Lukasiewycz, M. Glaß, F. Reimann, and J. Teich. “Opt 4 J - a modular framework for meta-heuristic optimization. ” In Proceedings of GECCO, 2011. [3] D. Le Berre and A. Parrain. “The SAT 4 J library, release 2. 2. ” Journal on Satisfiability, Boolean Modeling and Computation, 2010. [4] R. Dick. “Embedded system synthesis benchmarks suite (E 3 S)”, 2010. http: //ziyang. eecs. umich. edu/dickrp/e 3 s/ Slide 21

Experimental Results routing-table-based shapes are more SAT and extended constraint graph Without design-time optimization

Experimental Results routing-table-based shapes are more SAT and extended constraint graph Without design-time optimization for mapping result both 100% mapped apps compact mappings compact => heuristics perform better Slide 22

Experimental Results: Run-Time Mapping Heuristics produce mappings in SAT and extended constraint graph microseconds

Experimental Results: Run-Time Mapping Heuristics produce mappings in SAT and extended constraint graph microseconds embedder take around 100 ms Slide 23

Conclusion • Sharing of No. C resources opens possibilities for side-channel attacks • Spatial

Conclusion • Sharing of No. C resources opens possibilities for side-channel attacks • Spatial isolation of communication and computation closes side channels • We implemented spatially isolated mapping into the DAARM hybrid application flow: • At design time spatially isolated mapping shapes are optimized • During run-time, shapes are mapped by fast heuristics or a exact SAT-mapper • Mapping time between microseconds (heuristics) and hundred of milliseconds (SAT) Folie 24

This work was supported by the German Research Foundation (DFG) as part of the

This work was supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Re-search Center ”Invasive Computing” (SFB/TR 89). www. invasic. de Slide 25

Backup Slide 26

Backup Slide 26

Slide 27

Slide 27

Slide 28

Slide 28

Slide 29

Slide 29

Run-Time Mapping • Satisfiability Problem (SAT): • Selection Constraint (One shape incarnation per application)

Run-Time Mapping • Satisfiability Problem (SAT): • Selection Constraint (One shape incarnation per application) • Activation Constraint (If a shape incarnation is mapped, all belonging PEs are activated) • Exclusive PE constraint (PE is activated exactly by at most one shape incarnations) • SAT-based mapping can be applied for all applications concurrently or for one application after the other Slide 30

Scalable Basic Router Design • Basic router design of i-No. C represents state of

Scalable Basic Router Design • Basic router design of i-No. C represents state of the art • Wormhole packet switching – Flexible best effort (BE) communication – Reduced buffer-/area requirements • Distributed routing – XY routing implemented in hardware • Virtual channels – Increased performance – Enables Qo. S concept • Scalable topologies – Regular mesh Folie 31

Quality of Service – Communication Example II Run-time adaptive hard guarantees for …. …

Quality of Service – Communication Example II Run-time adaptive hard guarantees for …. … Throughput: … and Latency: SL Service Level TSTotal No. of Time Slots TPLink Round-Robin Scheduling Bandwidth Link H No. of Hops/Router LHop Packet Size für Time Slots (TS) Router Latency SPkt Folie 32

Possible Extensions • To prevent side-channel attacks through, e. g. temperature monitors an additional

Possible Extensions • To prevent side-channel attacks through, e. g. temperature monitors an additional shape with dummy PEs/routers be added Folie 33

Side-Channel Metrics • Side-Channel Vulnerability Factor (SVF): • Phase correlation between and attacker programs

Side-Channel Metrics • Side-Channel Vulnerability Factor (SVF): • Phase correlation between and attacker programs to quantify leakage • Applicable for all components • Cache Side-channel Vulnerability (CSV): • Using direct correlation in place of phase correlation • Only applicable for caches Demme, John, and Simha Sethumadhavan. "Side-Channel Vulnerability Metrics: SVF vs. CSV. " Folie 34

Isolation as Requirement Folie 35

Isolation as Requirement Folie 35