Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache architecture (SCache). SCache attempts to detect the corruption of return address values at runtime. When a return address store is executed, the cache generates a replica of the return address. This copied data is treated as read only. Subsequently, when the corresponding return address load is performed, the cache verifies the return address value loaded from the memory stack by means of comparing it with the replica data. Unfortunately, since the replica data is also a candidate for cache line replacements, SCache does not work well for application programs that cause higher cache miss rates. To resolve this issue, a lock and unlock data ...
Continuous technology scaling has brought us to a point, where transistors have become extremely sus...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Abstract-This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-ov...
In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at ...
Modern computer architectures share physical resources between different programs in order to increa...
Caches pose a significant challenge to formal proofs of security for code executing on application p...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
As buffer cache is used to overcome the speed gap between processor and storage devices, performance...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
[[abstract]]A method of reducing false sharing in a shared memory system by enabling two caches to m...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
Cache memories in embedded systems play an important role in reducing the execution time of the appl...
Continuous technology scaling has brought us to a point, where transistors have become extremely sus...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Abstract-This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-ov...
In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at ...
Modern computer architectures share physical resources between different programs in order to increa...
Caches pose a significant challenge to formal proofs of security for code executing on application p...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
As buffer cache is used to overcome the speed gap between processor and storage devices, performance...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
[[abstract]]A method of reducing false sharing in a shared memory system by enabling two caches to m...
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM. The hardware secur...
Cache memories in embedded systems play an important role in reducing the execution time of the appl...
Continuous technology scaling has brought us to a point, where transistors have become extremely sus...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...