On the Incomparability of Cache Algorithms in Terms of Timing Leakage

07/03/2018
by   Pablo Cañones, et al.
0

Modern computer architectures rely on caches to reduce the latency gap between the CPU and main memory. While indispensable for performance, caches pose a serious threat to security because they leak information about memory access patterns of programs via execution time. In this paper, we present a novel approach for reasoning about the security of cache algorithms with respect to timing leaks. The basis of our approach is the notion of leak competitiveness, which compares the leakage of two cache algorithms on every possible program. Based on this notion, we prove the following two results: First, we show that leak competitiveness is symmetric in the cache algorithms. This implies that no cache algorithm dominates another in terms of leakage via a program's total execution time. This is in contrast to performance, where it is known that such dominance relationships exist. Second, when restricted to caches with finite control, the leak-competitiveness relationship between two cache algorithms is either asymptotically linear or constant. No other shapes are possible.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/04/2019

SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection

CPU cache is limited but crucial storage on modern processor whereas the...
research
04/11/2020

Analysing Flow Security Properties in Virtualised Computing Systems

This paper studies the problem of reasoning about flow security properti...
research
07/01/2019

Parametric Timed Model Checking for Guaranteeing Timed Opacity

Information leakage can have dramatic consequences on systems security. ...
research
11/19/2019

MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State

The disclosure of the Spectre speculative-execution attacks in January 2...
research
11/24/2021

Locality-based Graph Reordering for Processing Speed-Ups and Impact of Diameter

Graph analysis involves a high number of random memory access patterns. ...
research
02/02/2023

An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation

This paper argues and shows that speculative vectorization, where a loop...
research
09/20/2019

Output-sensitive Information flow analysis

Constant-time programming is a countermeasure to prevent cache based att...

Please sign up or login with your details

Forgot password? Click here to reset