作者
Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth, Berk Sunar
发表日期
2019/8/15
期刊
International Journal of Parallel Programming
卷号
47
期号
4
页码范围
538-570
出版商
Springer US
简介
Cache attacks exploit memory access patterns of cryptographic implementations. Constant-time implementation techniques have become an indispensable tool in fighting cache timing attacks. These techniques engineer the memory accesses of cryptographic operations to follow a uniform key independent pattern. However, the constant-time behavior is dependent on the underlying architecture, which can be highly complex and often incorporates unpublished features. The CacheBleed attack targets cache bank conflicts and thereby invalidates the assumption that microarchitectural side-channel adversaries can only observe memory with cache line granularity. In this work, we propose MemJam, which utilizes 4K Aliasing to establish a side-channel attack that exploits false dependency of memory read-after-write events and provides a high quality intra cache line timing channel. As a proof of concept, we …
引用总数
20172018201920202021202220232024115213324253111