File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

백웅기

Baek, Woongki
Intelligent System Software Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace ZZ -
dc.citation.conferencePlace Seoul -
dc.citation.title IEEE International Symposium on High Performance Computer Architecture -
dc.contributor.author Kim, Sowoong -
dc.contributor.author Han, Myeonggyun -
dc.contributor.author Baek, Woongki -
dc.date.accessioned 2024-01-31T20:39:49Z -
dc.date.available 2024-01-31T20:39:49Z -
dc.date.created 2022-03-24 -
dc.date.issued 2022-04-04 -
dc.description.abstract Recent CPUs have begun to adopt non-inclusive cache hierarchies for more effective cache utilization. Non-inclusive cache hierarchies have an additional advantage in that they eliminate the vulnerability to cache-based side-channel attacks. In addition, precise timers are often disabled or added with noise to defeat timer-based side-channel attacks. With the combination of such countermeasures, existing cache- and directory-based side-channel attacks can robustly be defeated on commodity systems.In this work, we discover the vulnerability caused by the undocumented interactions between the coherence directories and Intel TSX transactions in latest Intel CPUs with non-inclusive cache hierarchies. Guided by the observation, we propose a high-precision and timer-free directory attack called DPrime+DAbort in non-inclusive cache hierarchies using Intel TSX, which nullifies the aforementioned countermeasures. Our quantitative evaluation conducted on real systems equipped with latest Intel CPUs in three different generations demonstrates the practicality of the DPrime+DAbort attack in that it can be used to attack cryptographic and genomesequencing applications. We also discuss potential countermeasures and evaluate the feasibility of an Intel TSX-based countermeasure against the DPrime+DAbort attack. -
dc.identifier.bibliographicCitation IEEE International Symposium on High Performance Computer Architecture -
dc.identifier.doi 10.1109/HPCA53966.2022.00014 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/76276 -
dc.identifier.url https://ieeexplore.ieee.org/document/9773224 -
dc.publisher IEEE -
dc.title DPrime+DAbort: A High-Precision and Timer-Free Directory-Based Side-Channel Attack in Non-Inclusive Cache Hierarchies using Intel TSX -
dc.type Conference Paper -
dc.date.conferenceDate 2022-04-02 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.