Computer Architecture/Cache security(9)
-
[Semi Thesis Review for me]Utility-Based Cache Partitioning: A Low-Overhead, High-Performance, Runtime Mechanism to Partition Shared Caches
Authors: Moinuddin K. Qureshi Yale N. Patt Department of Electrical and Computer Engineering The University of Texas at Austin {moin, patt}@hps.utexas.edu [Abstract] This paper investigates the problem of partitioning a shared cache between multiple concurrently executing applications. This paper proposes utility-based cache partitioning (UCP), a low-overhead, runtime mechanism that partitions a..
2020.07.22 -
[Semi thesis Review for me]CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing
Authors: Fangfei Liu1, Qian Ge2,3, Yuval Yarom2,4, Frank Mckeen5, Carlos Rozas5, Gernot Heiser2,3, Ruby B. Lee1 1 Department of Electrical Engineering, Princeton University, email: {fangfeil,rblee}@princeton.edu 2 NICTA, email: {qian.ge,gernot}@nicta.com.au 3 UNSW Australia 4 School of Computer Science, The University of Adelaide, email: yval@cs.adelaide.edu.au 5 Intel Labs, email: {frank.mckeen..
2020.07.21 -
[Seme Thesis Review for me] InvisiSpec: Making Speculatvie Execution Invisible in the Cache Hierarchy
author: Mengjia Yan† , Jiho Choi† , Dimitrios Skarlatos, Adam Morrison∗ , Christopher W. Fletcher, and Josep Torrellas University of Illinois at Urbana-Champaign ∗Tel Aviv University {myan8, jchoi42, skarlat2}@illinois.edu, mad@cs.tau.ac.il, {cwfletch, torrella}@illinois.edu †Authors contributed equally to this work. [1. Introduction] Spectre and Meltdown monitor the micro-architectural foot-pri..
2020.07.07 -
[Semi Thesis Review for me]FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
author: Yuval Yarom, Katrina Falkner, The University of Adelaide writter: Yu-gyoung Yun searchien@dgist.ac.kr [Abstract] Page sharing exposes processes to information leaks. We demonstrate the efficacy of the FLUSH+RELOAD attack by using it to extract the private encryption keys from a victim program running GnuPG 1.4.13. [1.Introduction] To reduce the memory footprint of a system, the system so..
2020.07.01 -
[Semi Thesis Review For me] Spectre Attacks: Exploiting Speculative Execution
Author: Paul Kocher1 , Jann Horn2 , Anders Fogh3 , Daniel Genkin4 , Daniel Gruss5 , Werner Haas6 , Mike Hamburg7 , Moritz Lipp5 , Stefan Mangard5 , Thomas Prescher6 , Michael Schwarz5 , Yuval Yarom8 1 Independent (www.paulkocher.com), 2 Google Project Zero, 3 G DATA Advanced Analytics, 4 University of Pennsylvania and University of Maryland, 5 Graz University of Technology, 6 Cyberus Technology,..
2020.06.30 -
Run the Meltdown, Meltdown 구현코드 돌려보기
아래의 내용은, Meltdown을 실습할 수 있는 아래의 git-hub 코드를 돌려보고직접 정리한 [Meltdown 분석 보고서]가 출처임을 밝힙니다. [Meltdown Proof-of-Concept] Git-hub link: https://github.com/IAIK/meltdown 위의 표 내용의 Reference는 다음과 같습니다. “CPU 취약점 Meltdown과 Spectre의 이해”, medium-Junghyun, 2018년 1월 28일 게시, 2020년 6월 26일 접속, https://medium.com/@kjhcloud/%EC%9D%B8%ED%85%94-cpu-%EC%B7%A8%EC%95%BD%EC%A0%90-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0-9ddab8d..
2020.06.30