2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2017
DOI: 10.1109/hst.2017.7951834
|View full text |Cite
|
Sign up to set email alerts
|

Connecting the dots: Privacy leakage via write-access patterns to the main memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The attacker could perform access pattern analysis to infer sensitive information from the memory accesses or the MMIO packets [57], [58]. We also consider DMA attacks [59], where an attacker take snapshots of the memory content at a high frequency, and cold boot attacks, where an attacker exploits the memory retention behavior DRAM to extract the content of memory directly. However, we assume that the tightly integrated PIM-enabled memory bank which includes the PIM core, PIM local memory and the access control logic are secure from physical attacks.…”
Section: Threat Model and Assumptionsmentioning
confidence: 99%
“…The attacker could perform access pattern analysis to infer sensitive information from the memory accesses or the MMIO packets [57], [58]. We also consider DMA attacks [59], where an attacker take snapshots of the memory content at a high frequency, and cold boot attacks, where an attacker exploits the memory retention behavior DRAM to extract the content of memory directly. However, we assume that the tightly integrated PIM-enabled memory bank which includes the PIM core, PIM local memory and the access control logic are secure from physical attacks.…”
Section: Threat Model and Assumptionsmentioning
confidence: 99%
“…Research has also shown that routers in the on-chip networks expose application traffic traces [23] that leads to information leakage. Furthermore, information can also be leaked via off-chip memory-based timing channels, where the adversary monitors memory latencies of the victim application [48], [49]. Prior works have explored various mitigation mechanisms, such as employing time-multiplexed memory bandwidth reservation [29], or adopting a non-interference memory controller [50].…”
Section: B Protecting Non-speculative Microarchitecture Statementioning
confidence: 99%