2019
DOI: 10.48550/arxiv.1906.02362
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Lookout for Zombies: Mitigating Flush+Reload Attack on Shared Caches by Monitoring Invalidated Lines

Abstract: OS-based page sharing is a commonly used optimization in modern systems to reduce memory footprint. Unfortunately, such sharing can cause Flush+Reload cache attacks, whereby a spy periodically flushes a cache line of shared data (using the clflush instruction) and reloads it to infer the access patterns of a victim application. Current proposals to mitigate Flush+Reload attacks are impractical as they either disable page sharing, or require application rewrite, or require OS support, or incur ISA changes. Idea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…DAWG [119] introduces minimal modifications on the hardware to fully isolate cache his/misses and metadata updates across protection domains in the cache set. ZBM [169] modifies the replacement policy to equalize the latencies of cache hits and misses on certain lines invalidated due to flush-caused invalidation.…”
Section: Architecture-level Strategiesmentioning
confidence: 99%
“…DAWG [119] introduces minimal modifications on the hardware to fully isolate cache his/misses and metadata updates across protection domains in the cache set. ZBM [169] modifies the replacement policy to equalize the latencies of cache hits and misses on certain lines invalidated due to flush-caused invalidation.…”
Section: Architecture-level Strategiesmentioning
confidence: 99%