Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978324
|View full text |Cite
|
Sign up to set email alerts
|

A Software Approach to Defeating Side Channels in Last-Level Caches

Abstract: We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud). Our approach dynamically manages physical memory pages shared between security domains to disable sharing of LLC lines, thus preventing "FLUSH-RELOAD" side channels via LLCs. It also manages cacheability of memory pages to thwart cross-tenant "PRIME-PROBE" attacks in LLCs. We have implemented our approac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 111 publications
(66 citation statements)
references
References 33 publications
0
66
0
Order By: Relevance
“…CACHEBAR [97] limits the contention caused by each process as a protection for the Prime+Probe attack. Like cache partitioning, this approach works at a process resolution and may require adaptions to work in the web browser scenario.…”
Section: Other Countermeasuresmentioning
confidence: 99%
“…CACHEBAR [97] limits the contention caused by each process as a protection for the Prime+Probe attack. Like cache partitioning, this approach works at a process resolution and may require adaptions to work in the web browser scenario.…”
Section: Other Countermeasuresmentioning
confidence: 99%
“…In particular, introducing redundancy and randomness to the S-Box tables for AES has been proposed [18]. A custom memory manager [40], relaxed inclusion caches [31] and solutions based on cache allocation technology (CAT) such as Catalyst [29] and vCat [32] are proposed to defend against LLC contention. Sanctum [30] and Ozone [41] are new processor designs with respect to cache attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Other proposals aimed to strengthen the victim application code to make it less vulnerable to CSCa attacks. This technique can be applied at the Operating System (OS) level [29,30] or at the application level using sanity verification frameworks [31,32]. Other approaches prevented cache sharing by distributing the VMs to different partitions in the cache, using either hardware [29,33] or software [34,35].…”
Section: Security and Communication Networkmentioning
confidence: 99%