2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) 2020
DOI: 10.1109/micro50266.2020.00092
|View full text |Cite
|
Sign up to set email alerts
|

CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches

Abstract: It is well known that there are micro-architectural vulnerabilities that enable an attacker to use caches to exfiltrate secrets from a victim. These vulnerabilities exploit the fact that the attacker can detect cache lines that were accessed by the victim. Therefore, architects have looked at different forms of randomization to thwart the attacker's ability to communicate using the cache. The security analysis of those randomly mapped caches is based upon the increased difficulty for the attacker to determine … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…However, the adversary can only deduce that some cache line was filled by the victim-the adversary does not learn the corresponding set index within the victim domain. Consider: if the victim had filled data into set 1, then with 1 4 probability the adversary would also observe one miss in the probe step, in way 1. If the victim had filled data into set x then with 1 4 probability the adversary would observe one miss in way x, and similarly a fill into set x + 1 would be observed with 1 4 probability as a miss in way x+1.…”
Section: B Designmentioning
confidence: 99%
See 3 more Smart Citations
“…However, the adversary can only deduce that some cache line was filled by the victim-the adversary does not learn the corresponding set index within the victim domain. Consider: if the victim had filled data into set 1, then with 1 4 probability the adversary would also observe one miss in the probe step, in way 1. If the victim had filled data into set x then with 1 4 probability the adversary would observe one miss in way x, and similarly a fill into set x + 1 would be observed with 1 4 probability as a miss in way x+1.…”
Section: B Designmentioning
confidence: 99%
“…Consider: if the victim had filled data into set 1, then with 1 4 probability the adversary would also observe one miss in the probe step, in way 1. If the victim had filled data into set x then with 1 4 probability the adversary would observe one miss in way x, and similarly a fill into set x + 1 would be observed with 1 4 probability as a miss in way x+1. Therefore, the standard PRIME+PROBE attack within a GALOISCACHE defined over G p n will only tell the adversary whether the victim filled any line, with 1/p n probability.…”
Section: B Designmentioning
confidence: 99%
See 2 more Smart Citations
“…In general, side channel attacks can be viewed via a communication model where there is a transmitter (the victim) that modulates a channel, with that modulation being detected by a receiver (the attacker) [5,14]. When the channel is a cache, the receiver is generally active, i.e., it modulates the channel itself in order to detect a transmission.…”
Section: Introductionmentioning
confidence: 99%