2014 47th Annual IEEE/ACM International Symposium on Microarchitecture 2014
DOI: 10.1109/micro.2014.28
|View full text |Cite
|
Sign up to set email alerts
|

Random Fill Cache Architecture

Abstract: Correctly functioning caches have been shown to leak critical secrets like encryption keys, through various types of cache side-channel attacks. This nullifies the security provided by strong encryption and allows confidentiality breaches, impersonation attacks and fake services. Hence, future cache designs must consider security, ideally without degrading performance and power efficiency. We introduce a new classification of cache side channel attacks: contention based attacks and reuse based attacks. Previou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
103
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 184 publications
(113 citation statements)
references
References 23 publications
0
103
0
Order By: Relevance
“…At the hardware level, several solutions have been proposed to prevent cache attacks, either by removing cache interferences, or randomizing them. The solutions include new secure cache designs [23,41,42] or altering the prefetcher policy [8]. However, hardware changes are not applicable to commodity systems.…”
Section: Countermeasuresmentioning
confidence: 99%
“…At the hardware level, several solutions have been proposed to prevent cache attacks, either by removing cache interferences, or randomizing them. The solutions include new secure cache designs [23,41,42] or altering the prefetcher policy [8]. However, hardware changes are not applicable to commodity systems.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Existing countermeasures to side-channel attacks can be categorized into three classes: hardware solutions, system solutions, and application solutions. Hardware solutions [12,15,47,49,78,79] require modification of the processors, which are typically effective, but are limited in that the time window required to have major processor vendors to incorporate them in commercial hardware is very long. System solutions only modify system software [40,46,75,89], but as they require trusted system software, they cannot be directly applied to SGX enclaves.…”
Section: Related Workmentioning
confidence: 99%
“…By focusing on cache occupancy rather than on activity within specific cache sets, our attack avoids the need for high resolution timers required by prior cache-based attacks. Furthermore, because our technique does not depend on the layout of the cache, it can overcome proposed countermeasures that randomize the cache layout [58,70,91].…”
Section: Our Contributionmentioning
confidence: 99%
“…Cache randomization techniques [58,70,91] dissociate victim and adversary cache sets, and prevent the adversary from monitoring victim access to specific addresses. However, our attack measures the overall cache activity rather than looking at specific victim accesses.…”
Section: Other Countermeasuresmentioning
confidence: 99%