Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It

AI-generated keywords: Cache randomization

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Cache randomization is a potential solution to combat conflict-based cache side-channel attacks
  • CEASER-S and ScatterCache are two recent implementations of randomized skewed caches that claim to mitigate these attacks
  • However, CEASER-S is susceptible to attack due to a usable eviction set being found within the chosen remap period
  • Increasing the number of partitions without dynamic remapping, as done in ScatterCache, does not eliminate the threat
  • Quantitative analysis of access patterns in the Last-Level Cache (LLC) reveals issues with hypotheses and implementations of randomized caches
  • Despite challenges, cache randomization remains a viable defense mechanism and should be widely adopted in future processors
  • The paper proposes new defense techniques that address vulnerabilities associated with existing cache randomization implementations
  • These newly discovered flaws can be resolved within the current performance budget
  • Randomized set-associative caches offer a better chance of adoption in commercial processors compared to skewed counterparts
  • This study highlights the need for refinement and improvement in existing cache randomization techniques but reaffirms its effectiveness as a defense strategy against conflict-based cache side-channel attacks.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu

2021 IEEE Symposium on Security and Privacy (SP)

Abstract: Cache randomization has recently been revived as a promising defense against conflict-based cache side-channel attacks. As two of the latest implementations, CEASER-S and ScatterCache both claim to thwart conflict-based cache side-channel attacks using randomized skewed caches. Unfortunately, our experiments show that an attacker can easily find a usable eviction set within the chosen remap period of CEASER-S and increasing the number of partitions without dynamic remapping, such as ScatterCache, cannot eliminate the threat. By quantitatively analyzing the access patterns left by various attacks in the LLC, we have newly discovered several problems with the hypotheses and implementations of randomized caches, which are also overlooked by the research on conflict-based cache side-channel attack. However, cache randomization is not a false hope and it is an effective defense that should be widely adopted in future processors. The newly discovered problems are corresponding to flaws associated with the existing implementation of cache randomization and are fixable. Several new defense techniques are proposed in this paper. our experiments show that all the newly discovered vulnerabilities of existing randomized caches are fixed within the current performance budget. We also argue that randomized set-associative caches can be sufficiently strengthened and possess a better chance to be actually adopted in commercial processors than their skewed counterparts as they introduce less overhaul to the existing cache structure.

Submitted to arXiv on 05 Aug. 2020

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2008.01957v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

, , , , Cache randomization has emerged as a potential solution to combat conflict-based cache side-channel attacks. Two recent implementations, CEASER-S and ScatterCache, have claimed to effectively mitigate these attacks by using randomized skewed caches. However, our experiments reveal that CEASER-S is susceptible to attack due to a usable eviction set being found within the chosen remap period. Additionally, increasing the number of partitions without dynamic remapping, as done in ScatterCache, does not eliminate the threat. Through quantitative analysis of access patterns left by various attacks in the Last-Level Cache (LLC), we have identified several issues with the hypotheses and implementations of randomized caches. These problems have been overlooked in previous research on conflict-based cache side-channel attacks. Despite these challenges, we assert that cache randomization remains a viable defense mechanism and should be widely adopted in future processors. In this paper, we propose several new defense techniques that address the vulnerabilities associated with existing cache randomization implementations. Importantly, our experiments demonstrate that all these newly discovered flaws can be resolved within the current performance budget. Furthermore, we argue that randomized set-associative caches offer a better chance of adoption in commercial processors compared to their skewed counterparts. This is because they introduce less overhaul to the existing cache structure while still providing sufficient strengthening against cache side-channel attacks. Overall, this study highlights the need for refinement and improvement in existing cache randomization techniques but reaffirms its effectiveness as a defense strategy against conflict-based cache side-channel attacks.
Created on 24 Jan. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.