ClkScrew
Aaron Zhang
ClkScrew Aaron Zhang Outline Introduction to DVFS and background - - PowerPoint PPT Presentation
ClkScrew Aaron Zhang Outline Introduction to DVFS and background information. What makes CLKSCREW unique? Challenges to CLKSCREW Attacks and Results Conclusion Voltage Energy + = Usage Frequency HARDWARE DVFS (Dynamic
ClkScrew
Aaron Zhang
Outline
DVFS (Dynamic Voltage and Frequency Scaling)
Outline
FLIP FLOP FLIP FLOP
1 1 1
FLIP FLOP FLIP FLOP
1 Less time for number to go through Flip-Flop
TRUSTZONE NON- TRUSTZONE
Steps
Outline
Do phones allow for overclocking/ under-volting?
How do you make sure the flip-flops do not damage the injected code?
CPU CORE 1 CPU CORE 2
Attacker Code Victim Thread
How do you get the timing precise enough? How do we make sure the attack
Outline
TRUSTZONE NON- TRUSTZONE
Inferring AES Keys
AES Decryption Attacking Code
TRUSTZONE NON- TRUSTZONE
Loading Apps into Trust Zone
Attacker’s App Attacking Code
App
1. Signature 1 2. Signature 2 3. Signature 3 4. Signature 4
Million clock cycles to validate.
corrupt data it needs to change just 65 thousand clock cycles within the entire process
Cache Profiling
takes for these instructions to be removed
the actual code. Timing Anchor
One instance of Desired Fault out of 65
Outline
Hardware Limits regarding Voltage and Frequency
volt their phones
chips from scratch and having every phone and chipmaker adhere to regulation.
Separate DVFS for Trustzone
cause massive overhead.
Randomization
know what to expect.
Conclusions