2017
DOI: 10.1007/978-3-319-66787-4_4
|View full text |Cite
|
Sign up to set email alerts
|

CacheZoom: How SGX Amplifies the Power of Cache Attacks

Abstract: arXiv:1703.06986v2 [cs.CR]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
167
1
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 188 publications
(169 citation statements)
references
References 45 publications
0
167
1
1
Order By: Relevance
“…Despite the applicability of LLC attacks, attacks on coreprivate resources such as L1 cache are as important [23,35]. Attacks on SGX in a system level adversarial scenario are notable examples [20,36]. There are other shared resources, which can be utilized to construct timing channels [37].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Despite the applicability of LLC attacks, attacks on coreprivate resources such as L1 cache are as important [23,35]. Attacks on SGX in a system level adversarial scenario are notable examples [20,36]. There are other shared resources, which can be utilized to construct timing channels [37].…”
Section: Related Workmentioning
confidence: 99%
“…Cache attacks can be exploited by adversaries where they share system cache memory with benign users. In scenarios where the adversary can colocate with a victim on the same core, she can attack core-private resources such as L1 cache, e.g., OS adversaries [20,36]. In cloud environment, virtualization platforms allow sharing of logical processors to different VMs; however, attacks on the shared LLC have a higher impact, since LLC is shared across all the cores.…”
Section: Cache Attacksmentioning
confidence: 99%
See 3 more Smart Citations