@inproceedings{b34b17054ec9465088b44b64f37e1a5c,
title = "Can randomized mapping secure instruction caches from side-channel attacks?",
abstract = "Information leakage through cache side channels is a serious threat in computer systems. The leak of secret cryptographic keys voids the protections provided by strong cryptography and software virtualization. Past cache side channel defenses focused almost entirely on data caches. Recently, instruction cache based side-channel attacks have been demonstrated to be practical- even in a Cloud Computing environment across two virtual machines. Unlike data caches, instruction caches leak information through secret-dependent execution paths. In this paper, we propose to use a classification matrix to quantitatively characterize the vulnerability of an instruction cache to software side channel attacks. We use this quantitative analysis to answer the open question: can randomized mapping proposed for thwarting data cache side channel attacks secure instruction caches? We further study the performance impact of the randomized mapping approach for the instruction cache.",
keywords = "Cache side channel, Randomized mapping, SVM",
author = "Fangfei Liu and Hao Wu and Lee, {Ruby B.}",
note = "Publisher Copyright: {\textcopyright} 2015 ACM.; 4th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2015 ; Conference date: 14-06-2015",
year = "2015",
month = jun,
day = "14",
doi = "10.1145/2768566.2768570",
language = "English (US)",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
booktitle = "Hardware and Architectural Support for Security and Privacy, HASP 2015",
}