Proceedings of the 46th International Symposium on Computer Architecture 2019
DOI: 10.1145/3307650.3322238
|View full text |Cite
|
Sign up to set email alerts
|

Secure TLBs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 17 publications
1
19
0
Order By: Relevance
“…For other microarchitectural components, Static-Partition TLB [58] was introduced, which follows the idea of static-partitioning cache and Sanctum to isolate the TLB accesses between the victim and the attacker. Wang et al [210] designed approaches to prevent information leakage via on-chip networks by restricting low-security traffic.…”
Section: Architecture-level Strategiesmentioning
confidence: 99%
“…For other microarchitectural components, Static-Partition TLB [58] was introduced, which follows the idea of static-partitioning cache and Sanctum to isolate the TLB accesses between the victim and the attacker. Wang et al [210] designed approaches to prevent information leakage via on-chip networks by restricting low-security traffic.…”
Section: Architecture-level Strategiesmentioning
confidence: 99%
“…RFillCache [35] selects random victims during cache-line replacement to hide the side effects of cache replacement policies. Secure-TLB [11] adopts a similar randomization replacement strategy to defeat TLBleed attacks [15]. FTM [43] targets cross-core Flush+Reload attacks by delaying the first access to the last-level cache.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, we believe that PThammer will be effective in machines that require somewhat longer time for eviction, e.g., due to associative TLB or larger associativity in the LLC. Cache designs that aim to prevent the creation of eviction sets, such as CEASER [43] or ScatterCache [54], or that randomize the TLB [11] can prevent PThammer. To the best of our knowledge, no mainstream processor implements such an approach.…”
Section: Limitationmentioning
confidence: 99%
“…Besides, PThammer is a kind of eviction-based cache and TLB attacks. It exploits the fact that cache and TLB are shared between sensitive data and crafted user data, clearly existing cache and TLB defenses such as Catalyst [34], ScatterCache [55] and Secure TLBs [11] can also mitigate PThammer by partitioning or randomizing either cache or TLB.…”
Section: Limitationmentioning
confidence: 99%