Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state as their exfiltration channel. While many existing defense mechanisms that can be implemented solely in software have been proposed, these mechanisms appear to patch specific attacks, and can be circumvented. In this paper, we propose minimal modifications to hardware to defend against a broad class of attacks, including those based on speculation, with the goal of eliminating the entire attack surface associated with the cache state covert channel. We propose DAWG, Dynamically Allocated Way Guard, a generic mechanism for secure way partition...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Recent CPUs have begun to adopt non-inclusive cache hierarchies for more effective cache utilization...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
Recent research has produced a number of viable side-channel attack methods based on the data-depend...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Recent CPUs have begun to adopt non-inclusive cache hierarchies for more effective cache utilization...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private informat...
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful atta...
Recent research has produced a number of viable side-channel attack methods based on the data-depend...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Contemporary computing employs cache hierarchy to fill the speed gap between processors and main mem...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...