CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches
暂无分享,去创建一个
Joel Emer | Thomas Bourgeat | Mengjia Yan | Yuheng Yang | Lillian Tsai | Jules Drean | J. Emer | Mengjia Yan | Thomas Bourgeat | Jules Drean | L. Tsai | Yuheng Yang
[1] Klaus Wagner,et al. Flush+Flush: A Stealthier Last-Level Cache Attack , 2015, ArXiv.
[2] Titu Andreescu,et al. Inclusion-Exclusion Principle , 2004 .
[3] T. Hornby. Side-Channel Attacks on Everyday Applications: Distinguishing Inputs with F LUSH +R ELOAD , 2016 .
[4] Nicolas Le Scouarnec,et al. Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters , 2015, RAID.
[5] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[6] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[7] Ingrid Verbauwhede,et al. Systematic Analysis of Randomization-based Protected Cache Architectures , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[8] Ruby B. Lee,et al. How secure is your cache against side-channel attacks? , 2017, 2017 50th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[9] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[10] Si Chen,et al. Side channel vulnerability metrics: the promise and the pitfalls , 2013, HASP '13.
[11] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[12] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[13] Moinuddin K. Qureshi. CEASER: Mitigating Conflict-Based Cache Attacks via Encrypted-Address and Remapping , 2018, 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[14] Gorka Irazoqui Apecechea,et al. Systematic Reverse Engineering of Cache Slice Selection in Intel Processors , 2015, 2015 Euromicro Conference on Digital System Design.
[15] Mahmut Kandemir,et al. CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[16] Simha Sethumadhavan,et al. Side-channel vulnerability factor: A metric for measuring information leakage , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[17] Stefan Mangard,et al. ARMageddon: Cache Attacks on Mobile Devices , 2015, USENIX Security Symposium.
[18] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[19] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[20] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[21] Srinivas Devadas,et al. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors , 2018, 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[22] Joseph Bonneau,et al. Cache-Collision Timing Attacks Against AES , 2006, CHES.
[23] Ingrid Verbauwhede,et al. Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCache , 2019, ArXiv.
[24] Matti A. Hiltunen,et al. An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.
[25] Michael Hamburg,et al. Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.
[26] Liwei Zhang,et al. A Statistics-based Fundamental Model for Side-channel Attack Analysis , 2014, IACR Cryptol. ePrint Arch..
[27] Daniel M. Gordon,et al. A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.
[28] Frank Piessens,et al. A Systematic Evaluation of Transient Execution Attacks and Defenses , 2018, USENIX Security Symposium.
[29] H. Poincaré,et al. The Inclusion–Exclusion Principle , 2021, An Invitation to Combinatorics.
[30] Moinuddin K. Qureshi. New Attacks and Defense for Encrypted-Address Cache , 2019, 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).
[31] Stefan Mangard,et al. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches , 2015, USENIX Security Symposium.
[32] Stefan Mangard,et al. Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR , 2016, CCS.
[33] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[34] Josep Torrellas,et al. Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[35] Pepe Vila,et al. Theory and Practice of Finding Eviction Sets , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[36] Craig Disselkoen,et al. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX , 2017, USENIX Security Symposium.
[37] C. Rebeiro,et al. Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER , 2020, IEEE Computer Architecture Letters.
[38] Xiao Liu,et al. CacheD: Identifying Cache-Based Timing Channels in Production Software , 2017, USENIX Security Symposium.
[39] Prateek Mittal,et al. Robust Website Fingerprinting Through the Cache Occupancy Channel , 2018, USENIX Security Symposium.
[40] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[41] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[42] Mario Werner,et al. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization , 2019, USENIX Security Symposium.
[43] Monte Carlo,et al. Markov Chain , 2017, Encyclopedia of Machine Learning and Data Mining.
[44] Jan Reineke,et al. CacheAudit: A Tool for the Static Analysis of Cache Side Channels , 2013, TSEC.