Abstract Multilevel cache architectures are widely used in modern heterogeneous systems for performance improvement. However, satisfying the performance and security requirements at the same time is a challenge for such systems. A simple and efficient timing attack on the shared portions of multilevel hierarchical caches and its corresponding countermeasure is proposed here. The proposed attack prolongs the execution time of the victim threads by inducing intentional race conditions in shared memory spaces. Then, a thread‐mapping algorithm to detect such race conditions between a group of threads and resolve them as a countermeasure against the attack is proposed. The proposed countermeasure dynamically monitors races on cache blocks and di...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
Abstract. Simultaneous multithreaded processors use shared on-chip caches, which yield better cost-p...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Abstract—Multi-threaded applications execute their threads on different cores with their own local c...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
In today's multi-core systems, cache contention due to true and false sharing can cause unexpected a...
Once the cache memory was introduced in computer systems, the well-known gap in speeds between the m...
International audienceCache attacks are widespread on microprocessors and multi-processor system-on-...
The cache interference is found to play a critical role in optimizing cache allocation among concurr...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
Abstract. Simultaneous multithreaded processors use shared on-chip caches, which yield better cost-p...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Abstract—Multi-threaded applications execute their threads on different cores with their own local c...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
In today's multi-core systems, cache contention due to true and false sharing can cause unexpected a...
Once the cache memory was introduced in computer systems, the well-known gap in speeds between the m...
International audienceCache attacks are widespread on microprocessors and multi-processor system-on-...
The cache interference is found to play a critical role in optimizing cache allocation among concurr...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...