首页> 外文会议>IEEE Symposium on Security and Privacy >Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World
【24h】

Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World

机译:攻击目录,而不是缓存:非包容性世界中的边信道攻击

获取原文

摘要

Although clouds have strong virtual memory isolation guarantees, cache attacks stemming from shared caches have proved to be a large security problem. However, despite the past effectiveness of cache attacks, their viability has recently been called into question on modern systems, due to trends in cache hierarchy design moving away from inclusive cache hierarchies. In this paper, we reverse engineer the structure of the directory in a sliced, non-inclusive cache hierarchy, and prove that the directory can be used to bootstrap conflict-based cache attacks on the last-level cache. We design the first cross-core Prime+Probe attack on non-inclusive caches. This attack works with minimal assumptions: the adversary does not need to share any virtual memory with the victim, nor run on the same processor core. We also show the first high-bandwidth Evict+Reload attack on the same hardware. We demonstrate both attacks by extracting key bits during RSA operations in GnuPG on a state-of-the-art non-inclusive Intel Skylake-X server.
机译:尽管云具有强大的虚拟内存隔离保证,但是事实证明,来自共享缓存的缓存攻击是一个很大的安全问题。但是,尽管过去有高速缓存攻击的有效性,但由于高速缓存层次结构设计的趋势已从包容性高速缓存层次结构转移开来,近来它们的生存能力在现代系统上受到了质疑。在本文中,我们对切片式,非包容式缓存层次结构中的目录结构进行了逆向工程,并证明了该目录可用于在最后一级缓存上引导基于冲突的缓存攻击。我们设计了针对非包容性缓存的首个跨核心Prime + Probe攻击。这种攻击的假设条件很简单:对手无需与受害者共享任何虚拟内存,也无需在同一处理器内核上运行。我们还展示了在同一硬件上的第一个高带宽Evict + Reload攻击。我们通过在最新型非包容性Intel Skylake-X服务器上的GnuPG中进行RSA操作期间提取密钥位来演示这两种攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号