dc.contributor.author | Agarwal, A. | |
dc.contributor.author | Kaur, J. | |
dc.contributor.author | Das, S. | |
dc.date.accessioned | 2021-11-29T10:22:11Z | |
dc.date.available | 2021-11-29T10:22:11Z | |
dc.date.issued | 2021-11-29 | |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/3265 | |
dc.description.abstract | Dynamic cache partitioning for shared Last Level Caches (LLC) is deployed in most modern multicore systems to achieve process isolation and fairness among the applications and avoid security threats. Since LLC has visibility of all cache blocks requested by several applications running on a multicore system, a malicious application can potentially threaten the system that can leverage the dynamic partitioning schemes applied to the LLCs by creating a timing-based covert channel attack. We call it as Cache Partitioned Covert Channel (CPCC) attack. The malicious applications may contain a trojan and a spy and use the underlying shared memory to create the attack. Through this attack, secret pieces of information like encryption keys or any secret information can be transmitted between the intended parties. We have observed that CPCC can target single or multiple cache sets to achieve a higher transmission rate with a maximum error rate of 5% only. The paper also addresses a few defense strategies that can avoid such cache partitioning based covert channel attacks | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Last Level Cache | en_US |
dc.subject | Covert Channel Attack | en_US |
dc.subject | Cache Partition | en_US |
dc.subject | Timing Channel Attack | en_US |
dc.title | Exploiting secrets by leveraging dynamic cache partitioning of last level cache | en_US |
dc.type | Article | en_US |