Description
The Network On Chip (NoC) does not isolate or incorrectly isolates its on-chip-fabric and internal resources such that they are shared between trusted and untrusted agents, creating timing channels.
Typically, network on chips (NoC) have many internal resources that are shared between packets from different trust domains. These resources include internal buffers, crossbars and switches, individual ports, and channels. The sharing of resources causes contention and introduces interference between differently trusted domains, which poses a security threat via a timing channel, allowing attackers to infer data that belongs to a trusted agent. This may also result in introducing network interference, resulting in degraded throughput and latency.
Potential Impact
Confidentiality, Availability
DoS: Resource Consumption (Other), Varies by Context, Other
Demonstrative Examples
The attacker runs a loop program on the core they control, and this causes a cache miss in every iteration for the RSA algorithm. Thus, by observing network-traffic bandwidth and timing, the attack program can determine when the RSA algorithm is doing a multiply operation (i.e., when the secret key bit is 1) and eventually extract the entire, secret key.Implement priority-based arbitration inside the NoC and have dedicated buffers or virtual channels for routing secret data from trusted agents.Mitigations & Prevention
Implement priority-based arbitration inside the NoC and have dedicated buffers or virtual channels for routing secret data from trusted agents.
Detection Methods
- Manual Analysis Moderate — Providing marker flags to send through the interfaces coupled with examination of which users are able to read or manipulate the flags will help verify that the proper isolation has been achieved and is effective.
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2021-33096 | Improper isolation of shared resource in a network-on-chip leads to denial of service |
Related Weaknesses
Frequently Asked Questions
What is CWE-1331?
CWE-1331 (Improper Isolation of Shared Resources in Network On Chip (NoC)) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The Network On Chip (NoC) does not isolate or incorrectly isolates its on-chip-fabric and internal resources such that they are shared between trusted and untrusted agents, creating timing channels.
How can CWE-1331 be exploited?
Attackers can exploit CWE-1331 (Improper Isolation of Shared Resources in Network On Chip (NoC)) to dos: resource consumption (other), varies by context, other. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-1331?
Key mitigations include: Implement priority-based arbitration inside the NoC and have dedicated buffers or virtual channels for routing secret data from trusted agents.
What is the severity of CWE-1331?
CWE-1331 is classified as a Base-level weakness (Medium abstraction). It has been observed in 1 real-world CVEs.