2008 41st IEEE/ACM International Symposium on Microarchitecture 2008
DOI: 10.1109/micro.2008.4771781
|View full text |Cite
|
Sign up to set email alerts
|

A novel cache architecture with enhanced performance and security

Abstract: Abstract-Caches ideally should have low miss rates and short access times, and should be power efficient at the same time. Such design goals are often contradictory in practice. Recent findings on efficient attacks based on information leakage in caches have also brought the security issue up front. Design for security introduces even more restrictions and typically leads to significant performance degradation. This paper presents a novel cache architecture that can simultaneously achieve the above goals. Spec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(20 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…For attacks involving a different execution context, we need to make sure that the entries in the GhB belonging to different contexts are isolated. Previous works [10,11,15,18,20,21,26,27,30,36,37] have already identified solutions to achieve this in regular caches, but given the special characteristics of the GhB, we propose the following:…”
Section: Different Executionmentioning
confidence: 99%
See 1 more Smart Citation
“…For attacks involving a different execution context, we need to make sure that the entries in the GhB belonging to different contexts are isolated. Previous works [10,11,15,18,20,21,26,27,30,36,37] have already identified solutions to achieve this in regular caches, but given the special characteristics of the GhB, we propose the following:…”
Section: Different Executionmentioning
confidence: 99%
“…This is not an attractive solution for general-purpose computing, as speculative execution offers substantial performance benefits. (2) Speculate but obfuscate microarchitectural changes so that an attacker cannot discern microarchitectural changes due to speculation [35][36][37]. (3) Speculate but do not change microarchitectural state until the speculation can be resolved.…”
Section: Introductionmentioning
confidence: 99%
“…Such a method is good to protect specific application, but would not be widely applied since each target application needs to be modified. Another type of random permutation is randomizing the mapping from machine address to cache sets [9,10,22], thus making information inferred from cache operations cannot reveal the memory access pattern of the victim. However, all current works of this type requires new design of hardware, leading to bad compatibility with current cloud platforms.…”
Section: Defense Against Cache-based Side Channelsmentioning
confidence: 99%
“…Accordingly, there are a large number of solutions proposed for defending against cache-based side-channel attacks. Most of them can be divided into two types: one requires modifying the hardware [9] [10], which imposes bad compatibility with current platform; the other needs to alter systems [11] [12] or vulnerable applications [13,14,15], which is too specific and cannot be applied widely. There are also some defense methods proposed for VMM layer [16,17,18,19,20], which might influence the operation of normal applications [16], or would only defend against a portion of cache attacks [17], or greatly reduce benefits of cache sharing [18] [19], or would bring too much overhead [20].…”
Section: Introductionmentioning
confidence: 99%
“…Another cache architecture is proposed in [Wang and Lee 2008] to reduce cache miss rate, to overcome access-time overhead and to thwart information leakage. They have used a security-aware cache replacement algorithm to thwart information leakage.…”
Section: Main Attributesmentioning
confidence: 99%