2023
DOI: 10.1016/j.compeleceng.2022.108546
|View full text |Cite
|
Sign up to set email alerts
|

A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The Last Level Cache (LLC) is shared among Enclaves and operating systems without trust, requiring eapp programmers to utilize other software or hardware solutions to mitigate cache timing channel vulnerabilities. Furthermore, Anh-Tien Le and others [8] have experimentally demonstrated that Spectre [9] attack techniques can exploit Cache timing attacks to breach the isolation of the Keystone framework, extracting protected data from the LLC.…”
Section: Introductionmentioning
confidence: 99%
“…The Last Level Cache (LLC) is shared among Enclaves and operating systems without trust, requiring eapp programmers to utilize other software or hardware solutions to mitigate cache timing channel vulnerabilities. Furthermore, Anh-Tien Le and others [8] have experimentally demonstrated that Spectre [9] attack techniques can exploit Cache timing attacks to breach the isolation of the Keystone framework, extracting protected data from the LLC.…”
Section: Introductionmentioning
confidence: 99%
“…The attacker then uses a cache covert channel [9]- [11] to decode the data. The Spectre attack has several variants, including Spectre-PHT, Spectre-BTB, and Spectre-RSB, which differ in the branch prediction units they exploit [1], [12]- [17] Spectre-BTB and Spectre-RSB attacks differ from Spectre-PHT in their use of indirect branches instead of directional branch instructions. Since indirect branches have no target restrictions, these attacks can result in speculative arbitrary code execution, causing a more significant security risk than Spectre-PHT.…”
Section: Introductionmentioning
confidence: 99%