2017
DOI: 10.48550/arxiv.1703.06986
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

CacheZoom: How SGX Amplifies The Power of Cache Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(18 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…Despite the applicability of LLC attacks, attacks on coreprivate resources such as L1 cache are as important [23,35]. Attacks on SGX in a system level adversarial scenario are notable examples [20,36]. There are other shared resources, which can be utilized to construct timing channels [37].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Despite the applicability of LLC attacks, attacks on coreprivate resources such as L1 cache are as important [23,35]. Attacks on SGX in a system level adversarial scenario are notable examples [20,36]. There are other shared resources, which can be utilized to construct timing channels [37].…”
Section: Related Workmentioning
confidence: 99%
“…Cache attacks can be exploited by adversaries where they share system cache memory with benign users. In scenarios where the adversary can colocate with a victim on the same core, she can attack core-private resources such as L1 cache, e.g., OS adversaries [20,36]. In cloud environment, virtualization platforms allow sharing of logical processors to different VMs; however, attacks on the shared LLC have a higher impact, since LLC is shared across all the cores.…”
Section: Cache Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…As it has been shown recently, enclaves leak information through the last-level cache, even to unprivileged user space applications, as they share the last-level cache with regular user space applications [6,28,54,64]. SGX enclaves provide a communication interface using so-called ecalls and ocalls, similar to the syscall interface.…”
Section: Evaluation Of 𝒫1 On Trusted Execution Environmentsmentioning
confidence: 99%