|
[1] Y. Yarom and K. E. Falkner, “Flush+reload: a high resolution, low noise, l3 cache side- channel attack.,” IACR Cryptology ePrint Archive, vol. 2013, p. 448, 2013. [2] C. Tang, P. Liu, C. Ma, Z. Liu, and J. Ge, “Flush+time: A high accuracy and high resolu- tion cache attack on arm-fpga embedded soc,” in 2020 IEEE 38th VLSI Test Symposium (VTS), pp. 1–6, 2020. [3] M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard, “ARMageddon: Cache attacks on mobile devices,” in 25th USENIX Security Symposium (USENIX Security 16), (Austin, TX), pp. 549–564, USENIX Association, Aug. 2016. [4] D. Gullasch, E. Bangerter, and S. Krenn, “Cache games – bringing access-based cache attacks on aes to practice,” in 2011 IEEE Symposium on Security and Privacy, pp. 490– 505, 2011. [5] F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R. B. Lee, “Last-level cache side-channel attacks are practical,” in 2015 IEEE Symposium on Security and Privacy, pp. 605–622, 2015. [6] P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom, “Spectre attacks: Exploiting spec- ulative execution,” Commun. ACM, vol. 63, p. 93–101, jun 2020. [7] M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh, J. Horn, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg, “Meltdown: Reading kernel memory from user space,” in 27th USENIX Security Symposium (USENIX Security 18), (Balti- more, MD), pp. 973–990, USENIX Association, Aug. 2018. [8] A. Agarwal, J. Kaur, and S. Das, “Exploiting secrets by leveraging dynamic cache par- titioning of last level cache,” in 2021 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1691–1696, 2021. [9] K. N. Khasawneh, E. M. Koruyeh, C. Song, D. Evtyushkin, D. Ponomarev, and N. Abu- Ghazaleh, “Safespec: Banishing the spectre of a meltdown with leakage-free speculation,” in 2019 56th ACM/IEEE Design Automation Conference (DAC), pp. 1–6, 2019. [10] M. Yan, J. Choi, D. Skarlatos, A. Morrison, C. Fletcher, and J. Torrellas, “Invisispec: Making speculative execution invisible in the cache hierarchy,” in 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), pp. 428–441, 2018. [11] S. Ainsworth and T. M. Jones, “Muontrap: Preventing cross-domain spectre-like attacks by capturing speculative state,” in Proceedings of the ACM/IEEE 47th Annual Interna- tional Symposium on Computer Architecture, ISCA ’20, p. 132–144, IEEE Press, 2020. [12] Z. Xu, L. Yin, Y. Lyu, H. Wang, G. Qu, and D. Wang, “Cacheguard: A behavior model checker for cache timing side-channel security: (invited paper),” in 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 19–24, 2022. [13] Z. Wang and R. B. Lee, “New cache designs for thwarting software cache-based side channel attacks,” SIGARCH Comput. Archit. News, vol. 35, p. 494–505, jun 2007. [14] F. Liu and R. B. Lee, “Random fill cache architecture,” in 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, pp. 203–215, 2014. [15] F. Liu, Q. Ge, Y. Yarom, F. Mckeen, C. Rozas, G. Heiser, and R. B. Lee, “Catalyst: Defeat- ing last-level cache side channel attacks in cloud computing,” in 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 406–418, 2016. [16] G. Saileshwar, S. Kariyappa, and M. Qureshi, “Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning,” in 2021 In- ternational Symposium on Secure and Private Execution Environment Design (SEED), pp. 37–49, 2021. [17] M. K. Qureshi and Y. N. Patt, “Utility-based cache partitioning: A low-overhead, high- performance, runtime mechanism to partition shared caches,” in 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO’06), pp. 423–432, 2006. [18] V. Kiriansky, I. Lebedev, S. Amarasinghe, S. Devadas, and J. Emer, “Dawg: A defense against cache timing attacks in speculative execution processors,” in 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), pp. 974–987, 2018. [19] Y. Wang, A. Ferraiuolo, D. Zhang, A. C. Myers, and G. E. Suh, “Secdcp: Se- cure dynamic cache partitioning for efficient timing channel protection,” in 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6, 2016. [20] S. Sari, O. Demir, and G. Kucuk, “Fairsdp: Fair and secure dynamic cache partitioning,” in 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 469–474, 2019. [21] P. Li, L. Zhao, R. Hou, L. Zhang, and D. Meng, “Conditional speculation: An effective approach to safeguard out-of-order execution against spectre attacks,” in 2019 IEEE Inter- national Symposium on High Performance Computer Architecture (HPCA), pp. 264–276, 2019. [22] J. Yu, M. Yan, A. Khyzha, A. Morrison, J. Torrellas, and C. W. Fletcher, “Speculative taint tracking (stt): A comprehensive protection for speculatively accessed data,” Commun. ACM, vol. 64, p. 105–112, nov 2021. [23] M. Kayaalp, K. N. Khasawneh, H. A. Esfeden, J. Elwell, N. Abu-Ghazaleh, D. Ponomarev, and A. Jaleel, “Ric: Relaxed inclusion caches for mitigating llc side-channel attacks,” in Proceedings of the 54th Annual Design Automation Conference 2017, DAC ’17, (New York, NY, USA), Association for Computing Machinery, 2017. [24] F. Yao, H. Fang, M. Doroslovaki, and G. Venkataramani, “Cotsknight: Practical defense against cache timing channel attacks using cache monitoring and partitioning technolo- gies,” 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 121–130, 2019. [25] Y. Guo, A. Zigerelli, Y. Zhang, and J. Yang, “Ivcache: Defending cache side channel attacks via invisible accesses,” in Proceedings of the 2021 on Great Lakes Symposium on VLSI, GLSVLSI ’21, (New York, NY, USA), p. 403–408, Association for Computing Machinery, 2021. [26] A. Cruz-Roa, A. Basavanhally, F. González, H. Gilmore, M. Feldman, S. Ganesan, N. Shih, J. Tomaszewski, and A. Madabhushi, “Automatic detection of invasive duc- tal carcinoma in whole slide images with convolutional neural networks,” Progress in Biomedical Optics and Imaging - Proceedings of SPIE, vol. 9041, 02 2014. [27] R. L. Burden and J. D. Faires, Numerical Analysis. The Prindle, Weber and Schmidt Series in Mathematics, Boston: PWS-Kent Publishing Company, fourth ed., 1989. [28] F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R. B. Lee, “Last-level cache side-channel attacks are practical,” in 2015 IEEE Symposium on Security and Privacy, pp. 605–622, 2015. [29] N. Binkert, B. Beckmann, G. Black, S. K. Reinhardt, A. Saidi, A. Basu, J. Hestness, D. R. Hower, T. Krishna, S. Sardashti, R. Sen, K. Sewell, M. Shoaib, N. Vaish, M. D. Hill, and D. A. Wood, “The gem5 simulator,” SIGARCH Comput. Archit. News, vol. 39, p. 1–7, aug 2011.
|