Cloud providers are increasingly exposed to malicious actors through transient attacks, such as Spectre and Meltdown. The cache hierarchy is the main target to build the required side-channels to leak data. Randomized caches can be employed to provide security but often rely on cryptographic primitives to deter side-channel attacks. These increase the access latency and deteriorates the system performance. This paper shows that randomized caches do not have to increase the cache access latency, and that their security does not have to rely on a cryptographic hash function or block-cipher. Herein, CoDi $\$ $ is proposed, a randomized last level cache that achieves security by tying the local and global states. Security is achieved through a...
Randomization is used in computer security as a tool to introduce unpredictability into the software...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Open Access: https://www.mdpi.com/2076-3417/12/5/2415International audienceCache timing attacks, i.e...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Abstract—In this paper we show a small but fast popularity-based front-end cache can provide provabl...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Randomization is used in computer security as a tool to introduce unpredictability into the software...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Open Access: https://www.mdpi.com/2076-3417/12/5/2415International audienceCache timing attacks, i.e...
© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an atta...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Abstract—In this paper we show a small but fast popularity-based front-end cache can provide provabl...
Cache side-channel attacks allow adversaries to learn sensitive information about co-running process...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Randomization is used in computer security as a tool to introduce unpredictability into the software...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...