Security Analysis of Cache Replacement Policies

  title={Security Analysis of Cache Replacement Policies},
  author={Pablo Ca{\~n}ones and B. K{\"o}pf and Jan Reineke},
  • Pablo Cañones, B. Köpf, Jan Reineke
  • Published in POST 2017
  • Computer Science
  • Modern computer architectures share physical resources between different programs in order to increase area-, energy-, and cost-efficiency. Unfortunately, sharing often gives rise to side channels that can be exploited for extracting or transmitting sensitive information. We currently lack techniques for systematic reasoning about this interplay between security and efficiency. In particular, there is no established way for quantifying security properties of shared caches. In this paper, we… CONTINUE READING
    6 Citations
    On the Incomparability of Cache Algorithms in Terms of Timing Leakage
    • 1
    • PDF
    Symbolic Verification of Cache Side-Channel Freedom
    • 10
    • PDF
    Analyzing Cache Side Channels Using Deep Neural Networks
    • 9
    • PDF
    Flushgeist: Cache Leaks from Beyond the Flush
    • 1
    • PDF
    Statistical Model Checking for Hyperproperties
    • 2
    • PDF
    Understanding multidimensional verification: Where functional meets non-functional
    • 3


    CacheAudit: A Tool for the Static Analysis of Cache Side Channels
    • 190
    • PDF
    New models of cache architectures characterizing information leakage from cache side channels
    • 36
    • PDF
    A Hardware Design Language for Timing-Sensitive Information-Flow Security
    • 120
    • PDF
    Cache Attacks and Countermeasures: The Case of AES
    • 1,055
    • PDF
    Predicting Secret Keys Via Branch Prediction
    • 261
    • PDF
    Measurement-based modeling of the cache replacement policy
    • Andreas Abel, Jan Reineke
    • Computer Science
    • 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS)
    • 2013
    • 28
    • PDF
    FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
    • 786
    • PDF
    Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
    • 97
    • PDF
    Advances on Access-Driven Cache Attacks on AES
    • 169
    • PDF
    HOTL: a higher order theory of locality
    • 74
    • PDF