Guard Cache: Creating Noisy Side-Channels

IEEE COMPUTER ARCHITECTURE LETTERS(2023)

引用 0|浏览1
暂无评分
摘要
Microarchitectural innovations such as deep cache hierarchies, out-of-order execution, branch prediction and speculative execution have made possible the design of processors that meet ever-increasing demands for performance. However, these innovations have inadvertently introduced vulnerabilities, which are exploited by side-channel attacks and attacks relying on speculative executions. Mitigating the attacks while preserving the performance has been a challenge. In this letter we present an approach to obfuscate cache timing, making it more difficult for side-channel attacks to succeed. We create false cache hits using a small Guard Cache with randomization, and false cache misses by randomly evicting cache lines. We show that our false hits and false misses cause very minimal performance penalties and our obfuscation can make it difficult for common side-channel attacks such as Prime &Probe, Flush &Reload or Evict &Time to succeed.
更多
查看译文
关键词
Side-channel attacks,Probes,Technological innovation,Benchmark testing,Out of order,Arrays,Performance gain,Cache side-Channel attacks,evict &time,flush &reload,guard cache,miss cache,obfuscating cache access timing,prime &probe,victim cache
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要