INSTITUTIONAL DIGITAL REPOSITORY

Exploiting secrets by leveraging dynamic cache partitioning of last level cache

Show simple item record

dc.contributor.author Agarwal, A.
dc.contributor.author Kaur, J.
dc.contributor.author Das, S.
dc.date.accessioned 2021-11-29T10:22:11Z
dc.date.available 2021-11-29T10:22:11Z
dc.date.issued 2021-11-29
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/3265
dc.description.abstract Dynamic cache partitioning for shared Last Level Caches (LLC) is deployed in most modern multicore systems to achieve process isolation and fairness among the applications and avoid security threats. Since LLC has visibility of all cache blocks requested by several applications running on a multicore system, a malicious application can potentially threaten the system that can leverage the dynamic partitioning schemes applied to the LLCs by creating a timing-based covert channel attack. We call it as Cache Partitioned Covert Channel (CPCC) attack. The malicious applications may contain a trojan and a spy and use the underlying shared memory to create the attack. Through this attack, secret pieces of information like encryption keys or any secret information can be transmitted between the intended parties. We have observed that CPCC can target single or multiple cache sets to achieve a higher transmission rate with a maximum error rate of 5% only. The paper also addresses a few defense strategies that can avoid such cache partitioning based covert channel attacks en_US
dc.language.iso en_US en_US
dc.subject Last Level Cache en_US
dc.subject Covert Channel Attack en_US
dc.subject Cache Partition en_US
dc.subject Timing Channel Attack en_US
dc.title Exploiting secrets by leveraging dynamic cache partitioning of last level cache en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account