作者
Shuwen Deng, Wenjie Xiong, Jakub Szefer
发表日期
2019/12
期刊
Journal of Hardware and Systems Security
卷号
3
期号
4
页码范围
397-425
出版商
Springer International Publishing
简介
Many secure cache designs have been proposed in literature with the aim of mitigating different types of cache timing–based attacks. However, there has so far been no systematic analysis of how these secure cache designs can, or cannot, protect against different types of the timing-based attacks. To provide a means of analyzing the caches, this paper presents a novel three-step modeling approach that is used to exhaustively enumerate all the possible cache timing–based vulnerabilities. The model covers not only attacks that leverage cache accesses or flushes from the local processor core, but also attacks that leverage changes in the cache state due to the cache coherence protocol actions from remote cores. Moreover, both conventional attacks and speculative execution attacks are considered. With the list of all possible cache timing vulnerabilities derived from the three-step model, this work further …
引用总数
2020202120222023202458882
学术搜索中的文章