Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security vulnerabilities in the context switch implementation of the security monitor #326

Open
neeluk7 opened this issue Jan 15, 2025 · 0 comments

Comments

@neeluk7
Copy link

neeluk7 commented Jan 15, 2025

Hello,

We have been analyzing several CC systems, especially the context switch implementations, to check if any security-sensitive architectural state is not swapped appropriately:

Security vulnerability:
The existing context switch implementation swaps the F-extension and V-extension architectural state only if the status of these states is Dirty in the sstatus CSR. (Link to code)

This can lead to timing channel attacks from the untrusted host due to the variation in context switch time.

This can be fixed by swapping these architectural state regardless of whether the state is Dirty or not, to achieve a constant time context switch.

Best Regards.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant