Proceedings of the 26th Symposium on Operating Systems Principles 2017
DOI: 10.1145/3132747.3132781
|View full text |Cite
|
Sign up to set email alerts
|

Secure Page Fusion with VUsion

Abstract: General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.• Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…Computing minimal, or at least small, eviction sets provides an essential primitive for removing or placing arbitrary data in the cache, which is essential for LLC cache attacks (Prime+Probe [4], Evict+Reload [23], etc. ), for DRAM fault attacks (such as Rowhammer [24], [2], which break the separation between security domains), for memory-deduplication attacks (such as VUSION [25]), as well as for the recent Meltdown [26] and Spectre [3] attacks (which use the cache to leak data across boundaries and to increase the number of speculatively executed instructions).…”
Section: Related Workmentioning
confidence: 99%
“…Computing minimal, or at least small, eviction sets provides an essential primitive for removing or placing arbitrary data in the cache, which is essential for LLC cache attacks (Prime+Probe [4], Evict+Reload [23], etc. ), for DRAM fault attacks (such as Rowhammer [24], [2], which break the separation between security domains), for memory-deduplication attacks (such as VUSION [25]), as well as for the recent Meltdown [26] and Spectre [3] attacks (which use the cache to leak data across boundaries and to increase the number of speculatively executed instructions).…”
Section: Related Workmentioning
confidence: 99%
“…Side channels have been widely studied when implemented natively from the CPU [6], [18], [30], [35], [39], [40], [52]. In recent years, however, researchers have relaxed the threat model by demonstrating remote attacks from a malicious JavaScript-enabled website [18], [38].…”
Section: A Side-channel Attacksmentioning
confidence: 99%
“…On the other hand, it enables different types of side-channels [21,10] that might compromise the confidentiality. Different solutions have been researched [24,14,9,16] so, depending on the adversary model of a cloud provider, memory deduplication can be used without the need to sacrifice security.…”
Section: Memory Deduplicationmentioning
confidence: 99%