In this paper, we propose a cache architecture, called SCache, to detect buffer-overflow attacks at run time. Furthermore, the energy-security efficiency of SCache is discussed. SCache generates replica cache lines on each return-address store, and compares the original value loaded from the memory stack to the replica one on the corresponding return-address load. The number and the placement policy of the replica line strongly affect both energy and vulnerability. In our evaluation, it is observed that SCache can protect more than 99.3% of return-address loads from buffer-overflow attacks, while it increases total cache energy consumption by about 23%, compared to a well-known lowpower cache
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
Caches pose a significant challenge to formal proofs of security for code executing on application p...
Abstract-This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-ov...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
本稿では,高度情報化社会システムの大きな脅威であるコンピュータ・ウィルス問題に着目し, それを解決するアーキテクチャ・アプローチとしてセキュア・キャッシュ(SCache)を提案する. また,このような...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Modern computer architectures share physical resources between different programs in order to increa...
none4We propose a low-leakage cache architecture based on the observation of the spatio-temporal pro...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
We propose a novel energy-efficient memory architecture which relies on the use of cache with a redu...
A wide range of attacks that target cache memories in secure systems have been reported in the last ...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
Caches pose a significant challenge to formal proofs of security for code executing on application p...
Abstract-This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-ov...
Abstract—This paper proposes an efficient cache line management algorithm for a security-aware cache...
本稿では,高度情報化社会システムの大きな脅威であるコンピュータ・ウィルス問題に着目し, それを解決するアーキテクチャ・アプローチとしてセキュア・キャッシュ(SCache)を提案する. また,このような...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Modern computer architectures share physical resources between different programs in order to increa...
none4We propose a low-leakage cache architecture based on the observation of the spatio-temporal pro...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
We propose a novel energy-efficient memory architecture which relies on the use of cache with a redu...
A wide range of attacks that target cache memories in secure systems have been reported in the last ...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
Caches pose a significant challenge to formal proofs of security for code executing on application p...