Skip to main navigation Skip to search Skip to main content

ITimed: Cache Attacks on the Apple A10 Fusion SoC

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

This paper proposes the first cache timing side-channel attack on one of Apple's mobile devices. Utilizing a recent, permanent exploit named checkm8, we reverse-engineered Apple's BootROM and created a powerful toolkit for running arbitrary hardware security experiments on Apple's in-house designed ARM systems-on-a-chip (SoC). Using this toolkit, we then implement an access-driven cache timing attack (in the style of PRIME+PROBE) as a proof-of-concept illustrator. The advanced hardware control enabled by our toolkit allowed us to reverse-engineer key microarchitectural details of the Apple A10 Fusion's memory hierarchy. We find that the SoC employs a randomized cache-line replacement policy as well as a hardware-based L1 prefetcher. We propose statistical innovations which specifically account for these hardware structures and thus further the state-of-the-art in cache timing attacks. We find that our access-driven attack, at best, can reduce the security of OpenSSL AES-128 by 50 more bits than a straightforward adaptation of PRIME+PROBE, while requiring only half as many side channel measurement traces.

Original languageEnglish
Title of host publicationProceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages80-90
Number of pages11
ISBN (Electronic)9781665413572
DOIs
StatePublished - 2021
Event2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021 - Virtual, Online, United States
Duration: Dec 13 2021Dec 14 2021

Publication series

NameProceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021

Conference

Conference2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
Country/TerritoryUnited States
CityVirtual, Online
Period12/13/2112/14/21

Fingerprint

Dive into the research topics of 'ITimed: Cache Attacks on the Apple A10 Fusion SoC'. Together they form a unique fingerprint.

Cite this