期刊文献+

一种自适应的cache驱逐策略

下载PDF
导出
摘要 随着互联网技术的发展,cache旁路攻击研究的逐渐深入,通过进程访问数据时产生cache命中和cache失效间不同的计时信息展开攻击的应用越来越多。其中,cache驱逐是执行cache旁路攻击的一种方法。文章通过介绍CPU cache的寻址机理,讨论现今常用的cache驱逐方法存在的利弊,提出一种自适应的cache驱逐方法,并在简单的对比实验后精炼出自适应策略的算法流程,说明该方法适用于所有的cache驱逐体制。
出处 《信息通信》 2016年第5期44-46,共3页 Information & Communications
  • 相关文献

参考文献18

  • 1Y. Tsunoo,,T. Saito,T. Suzaki,M. Shigeri,H. Miyauchi.Cryptanalysis of DES Implemented on Computers with Cache. Cryptographic Hardware and Embedded System-CHES 2003 . 2003
  • 2Bernstein D J.Cache-timing attacks on AES. http://cr.yp.to/papers.html#cachetiming . 2004
  • 3A. Osvik,A. Shamir,E. Tromer.Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology-CT-RSA . 2006
  • 4H.Wong.'Intel Ivy Bridge Cache Replacement Policy,'. http://blog.stuffedcow.net . 2015
  • 5S.Jahagirdar,V.George,I.Sodhi,R.Wells.'Power Management of the Third Generation Intel Core Micro Architecture formerly codenamed Ivy Bridge,'. Hot Chips . 2012
  • 6Y.Oren,V.P.Kemerlis,S.Sethumadhavan,A.D.Keromytis.'The Spy in the Sandbox-Practical Cache Attacks in Javascript,'. http://arxiv.org/abs/1502.07373 . 2015
  • 7C.Maurice,C.Neumann,O.Heen,A.Francillon.'C5:Cross-Cores Cache Covert Channel,'. Proceedings of the12th International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment(DIMVA’’15) . 2015
  • 8G.Irazoqui,T.Eisenbarth,B.Sunar.'S$A:A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing-and its Application to AES,'. IEEE Symposium on Security and Privacy-S&P . 2015
  • 9F.Liu,Y.Yarom,Q.Ge,G.Heiser,R.B.Lee.'LastLevel Cache Side-Channel Attacks are Practical,'. IEEE Symposium on Security and Privacy-S&P . 2015
  • 10D.Gruss,R.Spreitzer,S.Mangard.'Cache Template Attacks:Automating Attacks on Inclusive Last-Level Caches,'. 24th USENIX Security Symposium(USENIX Security 15) . 2015

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部