Composable Cachelets: Protecting Enclaves from Cache {Side-Channel} Attacks

D Townley, K Arıkan, YD Liu, D Ponomarev… - 31st USENIX Security …, 2022 - usenix.org
The security of isolated execution architectures such as Intel SGX has been significantly
threatened by the recent emergence of side-channel attacks. Cache side-channel attacks …

DR. SGX: hardening SGX enclaves against cache attacks with data location randomization

F Brasser, S Capkun, A Dmitrienko, T Frassetto… - arXiv preprint arXiv …, 2017 - arxiv.org
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-
channel attacks. In a common attack, the adversary monitors CPU caches to infer secret …

Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning

G Saileshwar, S Kariyappa… - … Symposium on Secure …, 2021 - ieeexplore.ieee.org
Cache partitioning is a principled defense against side-channel attacks on shared last-level
caches (LLCs). Such defenses allocate isolated cache regions to distrusting applications …

Attack directories, not caches: Side channel attacks in a non-inclusive world

M Yan, R Sprabery, B Gopireddy… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Although clouds have strong virtual memory isolation guarantees, cache attacks stemming
from shared caches have proved to be a large security problem. However, despite the past …

Ivcache: Defending cache side channel attacks via invisible accesses

Y Guo, A Zigerelli, Y Zhang, J Yang - Proceedings of the 2021 on Great …, 2021 - dl.acm.org
The sharing of last-level cache (LLC) among different CPU cores makes cache vulnerable to
side channel attacks. An attacker can get private information about co-running applications …

Strong and efficient cache {Side-Channel} protection using hardware transactional memory

D Gruss, J Lettner, F Schuster, O Ohrimenko… - 26th USENIX Security …, 2017 - usenix.org
Cache-based side-channel attacks are a serious problem in multi-tenant environments, for
example, modern cloud data centers. We address this problem with Cloak, a new technique …

Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks

S Briongos, I Bruhns, P Malagón… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Microarchitectural side channel attacks have been very prominent in security research over
the last few years. Caches proved to be an outstanding side channel, as they provide high …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks

B Gras, K Razavi, H Bos, C Giuffrida - 27th USENIX Security Symposium …, 2018 - usenix.org
To stop side channel attacks on CPU caches that have allowed attackers to leak secret
information and break basic security mechanisms, the security community has developed a …

Cache attacks on Intel SGX

J Götzfried, M Eckert, S Schinzel, T Müller - Proceedings of the 10th …, 2017 - dl.acm.org
For the first time, we practically demonstrate that Intel SGX enclaves are vulnerable against
cache-timing attacks. As a case study, we present an access-driven cache-timing attack on …