Skip to content
This repository was archived by the owner on Feb 27, 2026. It is now read-only.
This repository was archived by the owner on Feb 27, 2026. It is now read-only.

Security vulnerabilities in the context switch implementation of the security monitor #326

@neeluk7

Description

@neeluk7

Hello,

We have been analyzing several CC systems, especially the context switch implementations, to check if any security-sensitive architectural state is not swapped appropriately:

Security vulnerability:
The existing context switch implementation swaps the F-extension and V-extension architectural state only if the status of these states is Dirty in the sstatus CSR. (Link to code)

This can lead to timing channel attacks from the untrusted host due to the variation in context switch time.

This can be fixed by swapping these architectural state regardless of whether the state is Dirty or not, to achieve a constant time context switch.

Best Regards.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions