A short note on the paper `Are Randomized Caches Really Random?'

04/03/2023
by   Anirban Chakraborty, et al.
0

In this paper, we analyse the results and claims presented in the paper `Are Randomized Caches Truly Random? Formal Analysis of Randomized Partitioned Caches', presented at HPCA conference 2023. In addition, we also analyse the applicability of `Bucket and Ball' analytical model presented in MIRAGE (Usenix Security 2021) for its security estimation. We put forth the fallacies in the original bucket and ball model and discuss its implications. Finally, we demonstrate a cache occupancy attack on MIRAGE with just 10% of total cache capacity and extend the framework to establish a covert channel and a template-based fingerprinting attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/29/2021

Seeds of SEED: A Side-Channel Resilient Cache Skewed by a Linear Function over a Galois Field

Consider a set-associative cache with p^n sets and p^n ways where p is p...
research
07/13/2023

PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender

Cache side channel attacks are increasingly alarming in modern processor...
research
06/16/2021

Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities

Side-channel attacks on microprocessors, like the RISC-V, exhibit securi...
research
03/28/2023

The Mirage of Breaking MIRAGE: Refuting the HPCA-2023 Paper "Are Randomized Caches Truly Random?"

The HPCA-2023 paper "Are Randomized Caches Truly Random?" makes the clai...
research
01/27/2022

CacheFX: A Framework for Evaluating Cache Security

Over the last two decades, the danger of sharing resources between progr...
research
08/05/2020

Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It

Cache randomization has recently been revived as a promising defense aga...
research
05/30/2021

A Note On The Randomized Kaczmarz Method With A Partially Weighted Selection Step

In this note we reconsider two known algorithms which both usually conve...

Please sign up or login with your details

Forgot password? Click here to reset