4.6 Article

Defeating Hardware Prefetchers in Flush plus Reload Side-Channel Attack

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 21251-21257

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3056190

Keywords

Prefetching; Hardware; Probes; Side-channel attacks; Reverse engineering; Reliability; Timing; Hardware prefetching; Flush plus Reload; reverse engineering

Funding

  1. National Training Programs of Innovation and Entrepreneurship for Undergraduates in China

Ask authors/readers for more resources

Hardware prefetching can interfere with Flush+Reload cache side channel attack, but an improved method provided in this paper minimizes this impact effectively.
Hardware prefetching can seriously interfere with Flush+Reload cache side channel attack. This interference is not taken into consideration in previous Flush+Reload attacks. In this paper, an improved Flush+Reload is provided which minimizes the impact of hardware prefetchers. Specifically, prefetching is analyzed based on reverse engineering and the result is used to make an evaluation model to evaluate the impact of hardware prefetching on Flush+Reload attacks. Then the model is applied to fine tune the placement of probes in Flush+Reload attack to mitigate the prefetching impact. The experiments show that the approach is effective on the Core i5 processor which is equipped with highly aggressive prefetchers.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available