Last-Level Cache Side-Channel Attacks are
1 / 1

Last-Level Cache Side-Channel Attacks are

Author : phoebe-click | Published Date : 2025-05-12

Description: LastLevel Cache SideChannel Attacks are Practical Fangfei Liu Yuval Yarom Qian Ge Gernot Heiser Ruby B Lee Appeared in SP15 Presented by Baltasar Dinis and Rem Yang Sidechannel attacks are hard to deploy The L1i L1d and L2

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Last-Level Cache Side-Channel Attacks are" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Last-Level Cache Side-Channel Attacks are:
Last-Level Cache Side-Channel Attacks are Practical Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee Appeared in S&P'15 Presented by Baltasar Dinis and Rem Yang Side-channel attacks are hard to deploy The L1i, L1d (and L2) caches are: Fast and small → high timing resolution → easier to attack Core-private, thus unlikely to be shared among cloud clients Cloud providers disable page sharing between VMs This thwarts both FLUSH+RELOAD and EVICT+RELOAD attacks 2 LLC L1 L1 DRAM Prime + Probe 3 Sets Ways Attacker Victim Prime + Probe Prime a cache set 4 Sets Ways Attacker Victim Prime + Probe Prime a cache set Wait for some time 5 Sets Ways Attacker Victim Prime + Probe Prime a cache set Wait for some time Probe cache set 6 Sets Ways Attacker Victim Prime + Probe Victim did not access cache set Attacker probe is fast 7 Sets Ways Attacker Victim Prime + Probe Victim did access cache set Attacker probe is slow 8 Sets Ways Attacker Victim Evict Solving the "easy" challenges Q: If the secret data is in the L1, how can we observe data accesses in the LLC? A: Leverage the fact that the LLC is inclusive → evicting data in the LLC forces an eviction in the victim L1 Q: How to target specific cache sets in the LLC if it is physically indexed? A: By using huge pages in the attacker code, all the set index bits are in the page offset (constant under address translation) 9 LLC DRAM L1 L1 Prerequisite for PRIME+PROBE Attacker needs to know which memory accesses map to the same cache set (the eviction set) 10 LLC L1 L1 DRAM Sets Ways The LLC is sliced, and that's complicated Each core is connected to a local slice of the LLC, use a ring bus to handle remote accesses Slice ID is computed from a hash of the address The access latency varies with which slice we are targeting → we need to PRIME+PROBE within the same slice to get consistent time readings 11 L1 L1 LLC0 DRAM LLC1 PRIME+PROBE on the sliced LLC is hard Attacker needs to know which memory accesses map to the same cache set and cache slice 12 Slice 1 Slice 0 Slice 2 Constructing the Eviction Set Goal: partition lines (in the same set) into per-slice eviction sets For illustration, assume LLC has 2

Download Document

Here is the link to download the presentation.
"Last-Level Cache Side-Channel Attacks are"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Side channel attacks Security of Side channel attacks Practical Template-Algebraic Side Channel Attacks with Extr Micro Thwarting cache-based side-channel attacks Locality-Aware Data Replication in the Last-Level Cache Overview on Hardware Thwarting Cache Side-Channel Attacks Through TLC: A Tag-less Cache for reducing dynamic first level Cache Energy Micro a rchitectural  Side-Channel Attacks ReplayConfusion :  Detecting Cache-based Covert Channel Attacks Using Record and Replay Security issues in Parallel and Distributed Computing -