Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop 2019
DOI: 10.1145/3338508.3359574
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…This study emphasizes the additional functionality enabled by better visibility over data movement. Specifically, we demonstrate that täkō enables fine-grain monitoring of data for side-channel attacks [12,48,52,61,68,79,81,96,125,147].…”
Section: Detecting Side-channel Attacksmentioning
confidence: 97%
See 1 more Smart Citation
“…This study emphasizes the additional functionality enabled by better visibility over data movement. Specifically, we demonstrate that täkō enables fine-grain monitoring of data for side-channel attacks [12,48,52,61,68,79,81,96,125,147].…”
Section: Detecting Side-channel Attacksmentioning
confidence: 97%
“…The Morph only implements one callback, onEviction, which simply interrupts the main thread whenever any cache line containing the AES tables is evicted. This interrupt lets the victim defend itself from attack [12,102,125]. Fig.…”
Section: Detecting Side-channel Attacksmentioning
confidence: 99%
“…These caches reconfigure cache parameters such as block size, number of sets, associativity, to optimize the performance. The empirical analysis of adaptive cache from a security standpoint against cache timing channel attacks was done in [84]. The hypothesis behind the analysis was that it is difficult for an attacker to create ES when the attacker is unaware of the underlying cache's configuration.…”
Section: Randomizing Cache Configurationmentioning
confidence: 99%
“…This work expands upon our previous work [3]. The novel contributions include the description of a reference adaptive cache architecture and an attack detection mechanism, and analyzing the impact of cache flushing during cache reconfigurations on attack efficacy.…”
mentioning
confidence: 92%