Cache side-channel

Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks

Leonid Domnitser, Aamer Jaleel, Jason Loew, Nael Abu-Ghazaleh, and Dmitry Ponomarev. 2012. Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks. ACM Trans. Archit. Code Optim. 8, 4, Article 35 (January 2012), 21 pages.

Deconstructing New Cache Designs for Thwarting Software Cache-based Side Channel Attacks

Kong, J., Aciicmez, O., Seifert, J., and Zhou, H. 2008. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 2nd ACM Workshop on Computer Security Architectures (Alexandria, Virginia, USA, October 31 - 31, 2008). CSAW '08.

I-cache attack

Aciiçmez, O. 2007. Yet another MicroArchitectural Attack:: exploiting I-Cache. In Proceedings of the 2007 ACM Workshop on Computer Security Architecture (Fairfax, Virginia, USA, November 02 - 02, 2007). CSAW '07.

The detail information can be found in the paper below.

Branch prediction attack

Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert: New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. IMA Int. Conf. 2007: 185-203

The detail information can be found in the paper below.

Percival's attack

The detail information can be found in the paper below. The source code are provided by Jingfei Kong and are not guaranteed to provide meaningful results without synchronization. Use at your own risk!

Berstein's attack

The detail information can be found in the paper and the source code below.

Hardware-software integrated approaches to defend against software cache-based side channel attacks

Kong, J.; Aciicmez, O.; Seifert, J.-P.; Huiyang Zhou, "Hardware-software integrated approaches to defend against software cache-based side channel attacks," High Performance Computer Architecture, 2009. HPCA 2009. IEEE 15th International Symposium on , vol., no., pp.393-404, 14-18 Feb. 2009

Cache-collision timing attack

The detail information can be found in the paper and the source code below. The original copy from Joseph Bonneau can be found here.

Syndicate content
Cache collision attack experiments
Attack CPU L1-D