Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24086
|View full text |Cite
|
Sign up to set email alerts
|

PhantomCache: Obfuscating Cache Conflicts with Localized Randomization

Abstract: Cache conflicts due to deterministic memory-tocache mapping have long been exploited to leak sensitive information such as secret keys. While randomized mapping is fully investigated for L1 caches, it still remains unresolved about how to secure a much larger last-level cache (LLC). Recent solutions periodically change the mapping strategy to disrupt the crafting of conflicted addresses, which is a critical attack procedure to exploit cache conflicts. Remapping, however, increases both miss rate and access lat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(36 citation statements)
references
References 26 publications
(94 reference statements)
1
35
0
Order By: Relevance
“…Our work provides a baseline to compare future secure caches and their analysis. Future work should investigate how our techniques can be applied to concurrent work [46]. This paper also shows the importance of cryptanalytic resistance of the core randomization mapping.…”
Section: B Future Workmentioning
confidence: 91%
“…Our work provides a baseline to compare future secure caches and their analysis. Future work should investigate how our techniques can be applied to concurrent work [46]. This paper also shows the importance of cryptanalytic resistance of the core randomization mapping.…”
Section: B Future Workmentioning
confidence: 91%
“…One of the most recent approaches PhantomCache [27] is a pure architectural solution and uses a localized randomization technique to bound the randomized mapping to a limited number of cache sets. The randomization technique used in PhantomCache allows an address to be mapped to multiple locations within a single cache bank.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…However, the security goals we pursue with our design define important aspects of the concept and hence, we now define the attacker model. Our threat model is similar to previous work in this field [26], [27]: we consider a strong adversary model, i.e., a noise-free scenario, where the attacker is able to perfectly distinguish between a cache hit and a cache miss for any memory address. As in real-world attacks, the attacker has no insights on the internal state of the cache except those leaked by the timing differences of memory accesses.…”
Section: Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations