The most promising secure-cache design approaches use cache-set randomization to index cache contents thus thwarting cache side-channel attacks. Unfortunately, existing randomization proposals cannot be sucessfully applied to processors’ cache hierarchies due to the overhead added when dealing with coherency and virtual memory. In this paper, we solve existing limitations of hardware randomization approaches and propose a cost-effective randomization implementation to the whole cache hierarchy of a Linux-capable RISC-V processor.This work has been supported by the European HiPEAC Network of Excellence, by the Spanish Ministry of Economy and Competitiveness (contract TIN2015-65316-P), and by Generalitat de Catalunya (contracts 2017-SGR-1414 ...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
The most promising secure-cache design approaches use cache-set randomization to index cache content...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
The automotive domain is witnessing a relentless transition to autonomous cars demanding high-perfor...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Memory latency has become an important performance bottleneck in current microprocessors. This probl...
Cloud providers are increasingly exposed to malicious actors through transient attacks, such as Spec...
Kernel exploits are commonly used for privilege escalation to take full control over a system, e.g.,...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
The most promising secure-cache design approaches use cache-set randomization to index cache content...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
The automotive domain is witnessing a relentless transition to autonomous cars demanding high-perfor...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Memory latency has become an important performance bottleneck in current microprocessors. This probl...
Cloud providers are increasingly exposed to malicious actors through transient attacks, such as Spec...
Kernel exploits are commonly used for privilege escalation to take full control over a system, e.g.,...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...