Please use this identifier to cite or link to this item:
http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/3265
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Agarwal, A. | - |
dc.contributor.author | Kaur, J. | - |
dc.contributor.author | Das, S. | - |
dc.date.accessioned | 2021-11-29T10:22:11Z | - |
dc.date.available | 2021-11-29T10:22:11Z | - |
dc.date.issued | 2021-11-29 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/3265 | - |
dc.description.abstract | Dynamic cache partitioning for shared Last Level Caches (LLC) is deployed in most modern multicore systems to achieve process isolation and fairness among the applications and avoid security threats. Since LLC has visibility of all cache blocks requested by several applications running on a multicore system, a malicious application can potentially threaten the system that can leverage the dynamic partitioning schemes applied to the LLCs by creating a timing-based covert channel attack. We call it as Cache Partitioned Covert Channel (CPCC) attack. The malicious applications may contain a trojan and a spy and use the underlying shared memory to create the attack. Through this attack, secret pieces of information like encryption keys or any secret information can be transmitted between the intended parties. We have observed that CPCC can target single or multiple cache sets to achieve a higher transmission rate with a maximum error rate of 5% only. The paper also addresses a few defense strategies that can avoid such cache partitioning based covert channel attacks | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Last Level Cache | en_US |
dc.subject | Covert Channel Attack | en_US |
dc.subject | Cache Partition | en_US |
dc.subject | Timing Channel Attack | en_US |
dc.title | Exploiting secrets by leveraging dynamic cache partitioning of last level cache | en_US |
dc.type | Article | en_US |
Appears in Collections: | Year-2021 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full Text.pdf | 235.28 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.