2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) 2020
DOI: 10.1109/mascots50786.2020.9285962
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Reverse Engineering of Intel DRAM Addressing Using Performance Counters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…On ARM, L1 instruction cache misses are strongly correlated (0.98) with L2 data accesses (L1_ICM vs. L2_DCA). In the absence of a dedicated L2 instruction cache [12], this indicates that the L2 data cache is used as a de facto instruction cache, echoing existing work on using HPCs to uncover latent SoC properties [9], [10].…”
Section: Hpc Correlation Analysismentioning
confidence: 94%
See 3 more Smart Citations
“…On ARM, L1 instruction cache misses are strongly correlated (0.98) with L2 data accesses (L1_ICM vs. L2_DCA). In the absence of a dedicated L2 instruction cache [12], this indicates that the L2 data cache is used as a de facto instruction cache, echoing existing work on using HPCs to uncover latent SoC properties [9], [10].…”
Section: Hpc Correlation Analysismentioning
confidence: 94%
“…These utilised fresh TEE-bound keys which were generated at random on a per-session basis. 10 The aim, similar to §3, is to identify the precise algorithm used by the Victim from PMU measurements before and after its invocation by the Spy. The Spy is given only the aforementioned high-level functions for signing, verification, encryption, and decryption.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Current computing systems employ various layers of address mappings that obfuscate the DRAM row-bank-column address mapping from the programmer [53]. Contemporary processors use complex functions to map physical addresses to DDRX addresses [54].…”
Section: Memory Allocation Mechanismmentioning
confidence: 99%