2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00042
|View full text |Cite
|
Sign up to set email alerts
|

Theory and Practice of Finding Eviction Sets

Abstract: Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups of virtual addresses that map to the same cache set. This capability has become a decisive primitive for cache sidechannel, rowhammer, and speculative execution attacks. Despite their importance, algorithms for finding small eviction sets have not been systematically studied in the literature.In this paper, we perform such a systematic study. We begin by formalizing the problem and analyzing t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
80
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 93 publications
(93 citation statements)
references
References 28 publications
1
80
0
Order By: Relevance
“…[31,107,190] provide methods for reverse engineering DRAM address mapping such that attackers can determine the two rows that surround a victim row and hammer the victim row more effectively for causing RowHammer failures. [244] provides an algorithm for determining the eviction set of cache lines in linear time such that an attacker can maximize accesses to DRAM even when caching is unavoidable. [17] repurposes a DDR protocol analyzer with a DIMM interposer to count the activations to each row within a 64 ms interval to detect whether RowHammer occurs in any application.…”
Section: E Platforms For Studying Rowhammermentioning
confidence: 99%
“…[31,107,190] provide methods for reverse engineering DRAM address mapping such that attackers can determine the two rows that surround a victim row and hammer the victim row more effectively for causing RowHammer failures. [244] provides an algorithm for determining the eviction set of cache lines in linear time such that an attacker can maximize accesses to DRAM even when caching is unavoidable. [17] repurposes a DDR protocol analyzer with a DIMM interposer to count the activations to each row within a 64 ms interval to detect whether RowHammer occurs in any application.…”
Section: E Platforms For Studying Rowhammermentioning
confidence: 99%
“…An alternative to the high-resolution timer is a counting thread which is commonly used for microarchitectural attacks in JavaScript [29,53,80]. Furthermore, as the clflush instruction is not available in JavaScript, we resort to Evict+Reload as described in related work [29,76,90]. Instead of measuring only Table 3: We compare microarchitectural attacks on KASLR.…”
Section: Meltdown and Kaslr Break In Javascriptmentioning
confidence: 99%
“…Then they conduct dynamic remapping to change the mapping strategy from time to time so as to bring randomness. They, however, have recently been found insecure against the state-of-the-art attacking algorithm with linear complexity [35], [40], [45]. To prevent the state-of-the-art attack, these countermeasures need an extremely frequent remapping, which will cause unacceptable performance overhead [35].…”
Section: Introductionmentioning
confidence: 99%