2015
DOI: 10.1007/978-3-319-20550-2_3
|View full text |Cite
|
Sign up to set email alerts
|

C5: Cross-Cores Cache Covert Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 94 publications
(62 citation statements)
references
References 19 publications
0
62
0
Order By: Relevance
“…To obtain and verify cache miss rate and dTLB miss rate, some cache-based side channel attacks have been implemented here [4,11,12]. As a comparison, a side channel attack rsa_time_attack by Paul Cristian Pintilie, a normal attack web_timing_attack by Daniel Honig, and two benign processes are selected.…”
Section: Characteristics Analysismentioning
confidence: 99%
“…To obtain and verify cache miss rate and dTLB miss rate, some cache-based side channel attacks have been implemented here [4,11,12]. As a comparison, a side channel attack rsa_time_attack by Paul Cristian Pintilie, a normal attack web_timing_attack by Daniel Honig, and two benign processes are selected.…”
Section: Characteristics Analysismentioning
confidence: 99%
“…The authors then change the protocol for better error handling effectively lowering the data transmission rate to about 110 bps but an improved error rate of 0.75%. Maurice et al [28] again target the shared last level cache, but address the uncertainty of which cache lines the cooperating parties should transmit upon using inclusiveness. In doing so, they achieve a bit rate of 751 bps in a virtualized environment.…”
Section: B Covert Communication Channelsmentioning
confidence: 99%
“…These attacks occur when two cooperating, but isolated, parties communicate with one another. Often covert channels are used to extract information, but can also be effective in determining multi-tenancy [14], [39], [28], [38], [36].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the feasibility of this attack is decreased since how to overcome addressing uncertainty is still an open research question. Recently, 2 high-bandwidth CCs have been proposed by Clémentine et al 36 and Liu et al, 5 which use the LLC to tackle the problem of addressing uncertainty and core migration. Both channels are based on the Prime+Probe strategy and rely on the inclusive property of the LLC, which means that the LLC is a superset of the L1 and L2 caches and every cache line that is evicted from the LLC gets removed from the L1 and L2 caches likewise.…”
Section: Central Processing Unitmentioning
confidence: 99%