New Attacks and Defense for Encrypted-Address Cache

Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts. Such attacks can be mitigated by randomizing the location of the lines in the cache. Our recent proposal, CEASER, makes cache randomization prac...

Full description

Saved in:
Bibliographic Details
Published in:2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA) pp. 360 - 371
Main Author: Qureshi, Moinuddin K.
Format: Conference Proceeding
Language:English
Published: ACM 01.06.2019
Subjects:
ISSN:2575-713X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first