Skip to main navigation Skip to search Skip to main content

Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Microarchitectural side-channel attacks exploit vulnerabilities such as cache behavior to leak sensitive data. These attacks have been extensively studied on x86 architectures but they remain less explored on RISC-V systems. A recent paper (Gerlach et al., 2023) demonstrated existing and novel microarchitectural attacks on RISC-V hardware platforms (C906, U74, C910, C908). This hardware-based analysis, while realistic, lacks the flexibility and detailed behavioral insights needed to fully understand these attacks. Simulation environments like gem5 (Lowe-Power, 2024) provide fine-grained control and diverse metrics to overcome this limitation and observe the attack in detail. In this paper, gem5 is used to explore Flush+Fault (Gerlach et al., 2023) side-channel attack on RISC-V architecture which was originally tested on RISC-V hardware. Through gem5, we analyze detailed insights of attack such as cache patterns, and timing behaviors. Our results demonstrate the gem5’s potential for advancing the understanding of RISC-V microarchitectural vulnerabilities and eventually for developing effective countermeasures.

Original languageEnglish
Title of host publicationProceedings of the 22nd International Conference on Security and Cryptography, SECRYPT 2025
EditorsSabrina De Capitani Di Vimercati, Pierangela Samarati
PublisherScience and Technology Publications, Lda
Pages607-612
Number of pages6
ISBN (Print)9789897587603
DOIs
Publication statusPublished - 1 Jan 2025
Event22nd International Conference on Security and Cryptography, SECRYPT 2025 - Bilbao, Spain
Duration: 11 Jun 202513 Jun 2025

Publication series

NameProceedings of the International Conference on Security and Cryptography
Volume1
ISSN (Print)2184-7711

Conference

Conference22nd International Conference on Security and Cryptography, SECRYPT 2025
Country/TerritorySpain
CityBilbao
Period11/06/2513/06/25

Keywords

  • Cache Timing Analysis
  • Complex Systems
  • Embedded Systems
  • Microarchitectural Security
  • Privacy
  • RISC-V
  • Security
  • Side-Channel Attacks
  • gem5 Simulator

Fingerprint

Dive into the research topics of 'Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator'. Together they form a unique fingerprint.

Cite this