Computer Architecture(14)
-
[Seme Thesis Review for me] InvisiSpec: Making Speculatvie Execution Invisible in the Cache Hierarchy
author: Mengjia Yan† , Jiho Choi† , Dimitrios Skarlatos, Adam Morrison∗ , Christopher W. Fletcher, and Josep Torrellas University of Illinois at Urbana-Champaign ∗Tel Aviv University {myan8, jchoi42, skarlat2}@illinois.edu, mad@cs.tau.ac.il, {cwfletch, torrella}@illinois.edu †Authors contributed equally to this work. [1. Introduction] Spectre and Meltdown monitor the micro-architectural foot-pri..
2020.07.07 -
[Semi Thesis Review for me]FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
author: Yuval Yarom, Katrina Falkner, The University of Adelaide writter: Yu-gyoung Yun searchien@dgist.ac.kr [Abstract] Page sharing exposes processes to information leaks. We demonstrate the efficacy of the FLUSH+RELOAD attack by using it to extract the private encryption keys from a victim program running GnuPG 1.4.13. [1.Introduction] To reduce the memory footprint of a system, the system so..
2020.07.01 -
[Semi Thesis Review For me] Spectre Attacks: Exploiting Speculative Execution
Author: Paul Kocher1 , Jann Horn2 , Anders Fogh3 , Daniel Genkin4 , Daniel Gruss5 , Werner Haas6 , Mike Hamburg7 , Moritz Lipp5 , Stefan Mangard5 , Thomas Prescher6 , Michael Schwarz5 , Yuval Yarom8 1 Independent (www.paulkocher.com), 2 Google Project Zero, 3 G DATA Advanced Analytics, 4 University of Pennsylvania and University of Maryland, 5 Graz University of Technology, 6 Cyberus Technology,..
2020.06.30 -
Run the Meltdown, Meltdown 구현코드 돌려보기
아래의 내용은, Meltdown을 실습할 수 있는 아래의 git-hub 코드를 돌려보고직접 정리한 [Meltdown 분석 보고서]가 출처임을 밝힙니다. [Meltdown Proof-of-Concept] Git-hub link: https://github.com/IAIK/meltdown 위의 표 내용의 Reference는 다음과 같습니다. “CPU 취약점 Meltdown과 Spectre의 이해”, medium-Junghyun, 2018년 1월 28일 게시, 2020년 6월 26일 접속, https://medium.com/@kjhcloud/%EC%9D%B8%ED%85%94-cpu-%EC%B7%A8%EC%95%BD%EC%A0%90-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0-9ddab8d..
2020.06.30 -
[Semi Thesis Review for me] Meltdown: reading Kernel Memory from User Space -(3)
Author: Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Yarom7 , Mike Hamburg8 1Graz University of Technology, 2Cyberus Technology GmbH, 3G-Data Advanced Analytics, 4Google Project Zero, 5 Independent (www.paulkocher.com), 6University of Michigan, 7University of Adelaide & Da..
2020.06.30 -
[Semi Thesis Review for me] Meltdown: reading Kernel Memory from User Space -(2)
Author: Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Yarom7 , Mike Hamburg8 1Graz University of Technology, 2Cyberus Technology GmbH, 3G-Data Advanced Analytics, 4Google Project Zero, 5 Independent (www.paulkocher.com), 6University of Michigan, 7University of Adelaide & Da..
2020.06.30