Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures

@article{Guanciale2016CacheSC,
  title={Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures},
  author={Roberto Guanciale and Hamed Nemati and Christoph Baumann and Mads Dam},
  journal={2016 IEEE Symposium on Security and Privacy (SP)},
  year={2016},
  pages={38-55}
}
Caches pose a significant challenge to formal proofs of security for code executing on application processors, as the cache access pattern of security-critical services may leak secret information. This paper reveals a novel attack vector, exposing a low-noise cache storage channel that can be exploited by adapting well-known timing channel analysis techniques. The vector can also be used to attack various types of security-critical software such as hypervisors and application security monitors… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 32 CITATIONS

Principles of Security and Trust

  • Lecture Notes in Computer Science
  • 2018
VIEW 13 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

TruSense: Information Leakage from TrustZone

  • IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
  • 2018
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 6 EXCERPTS
CITES BACKGROUND, RESULTS & METHODS
HIGHLY INFLUENCED

Demystifying Arm TrustZone: A Comprehensive Survey

  • ACM Comput. Surv.
  • 2019
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Analysis of Secure Caches and Timing-Based Side-Channel Attacks

  • IACR Cryptology ePrint Archive
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

  • IEEE Transactions on Dependable and Secure Computing
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 50 REFERENCES

Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel

  • IACR Cryptology ePrint Archive
  • 2002
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Automating Information Flow Analysis of Low Level Code

  • ACM Conference on Computer and Communications Security
  • 2014
VIEW 3 EXCERPTS

Cross-VM side channels and their use to extract private keys

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Proceedings of the 16th international conference on financial cryptography and data security

M. Weiß, B. Heinz, F. Stumpf
  • FC’2012, pages 314–328. Springer,
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Advances on Access-Driven Cache Attacks on AES

  • Selected Areas in Cryptography
  • 2006
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL