2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2019
DOI: 10.1109/hst.2019.8741033
|View full text |Cite
|
Sign up to set email alerts
|

A Fetching Tale: Covert Communication with the Hardware Prefetcher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…When we reload a shared page, instead of loading the cache line sequentially, we use the modern version of the Fisher-Yates shuffle algorithm [16] to randomize the index sequence in the searching range (i.e., [0,63]). In addition, we add mfence and lfence when we measure the memory instruction execution time to ensure that measured memory and cache access time is accurate [14].…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…When we reload a shared page, instead of loading the cache line sequentially, we use the modern version of the Fisher-Yates shuffle algorithm [16] to randomize the index sequence in the searching range (i.e., [0,63]). In addition, we add mfence and lfence when we measure the memory instruction execution time to ensure that measured memory and cache access time is accurate [14].…”
Section: Methodsmentioning
confidence: 99%
“…Haswell, a newer generation microarchitecture, uses enhanced data prefetchers [25], but the details of these updates remain undocumented. Prior works [14,51,59] have attempted to reverse-engineer a number of the characteristics of the Intel IP-stride prefetcher. However, in this work, we take an additional step to reverse-engineer the major components of the IP-stride prefetcher in the Haswell and Coffee Lake microarchitectures.…”
Section: Understanding Intel's Ip-stride Prefetchermentioning
confidence: 99%
See 3 more Smart Citations