Although clouds have strong virtual memory isolation guarantees, cache attacks stemming from shared caches have proved to be a large security problem. However, despite the past effectiveness of cache attacks, their viability has recently been called into question on modern systems, due to trends in cache hierarchy design moving away from inclusive cache hierarchies.In this paper, we reverse engineer the structure of the directory in a sliced, non-inclusive cache hierarchy, and prove that the directory can be used to bootstrap conflict-based cache attacks on the last-level cache. We design the first cross-core Prime+Probe attack on non-inclusive caches. This attack works with minimal assumptions: the adversary does not need to share any virtual memory with the victim, nor run on the same processor core. We also show the first high-bandwidth Evict+Reload attack on the same hardware. We demonstrate both attacks by extracting key bits during RSA operations in GnuPG on a state-of-the-art non-inclusive Intel Skylake-X server.
Electric utilities are currently installing wide area monitoring systems which include phasor measurement units (PMU) and phasor data concentrators (PDC). The IEEE C37.118 protocol is used for network communication between these devices. Protocol mutation attacks against this protocol can lead to denial of service and a loss of visibility of the state of the power system. This paper is a preview of a set rules developed to proactively monitor for protocol mutation attacks against the IEEE C37.118 protocol. Eleven rules were described in this paper. A total of 36 rules have been developed. This paper also describes validation of the rules and proposes and architecture for implementing the rules in a utility network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.