TY - GEN
T1 - Covert and side channels due to processor architecture
AU - Wang, Zhenghong
AU - Lee, Ruby B.
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show how processor architecture features such as simultaneous multithreading, control speculation and shared caches can inadvertently accelerate such covert channels or enable new covert channels and side channels. We first illustrate the reality and severity of this problem by describing concrete attacks. We identify two new covert channels. We show orders of magnitude increases in covert channel capacities. We then present two solutions, Selective Partitioning and the novel Random Permutation Cache (RPCache). The RPCache can thwart most cache-based software side channel attacks, with minimal hardware costs and negligible performance impact.
AB - Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show how processor architecture features such as simultaneous multithreading, control speculation and shared caches can inadvertently accelerate such covert channels or enable new covert channels and side channels. We first illustrate the reality and severity of this problem by describing concrete attacks. We identify two new covert channels. We show orders of magnitude increases in covert channel capacities. We then present two solutions, Selective Partitioning and the novel Random Permutation Cache (RPCache). The RPCache can thwart most cache-based software side channel attacks, with minimal hardware costs and negligible performance impact.
UR - http://www.scopus.com/inward/record.url?scp=34547331261&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34547331261&partnerID=8YFLogxK
U2 - 10.1109/ACSAC.2006.20
DO - 10.1109/ACSAC.2006.20
M3 - Conference contribution
AN - SCOPUS:34547331261
SN - 0769527167
SN - 9780769527161
T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC
SP - 473
EP - 482
BT - Proceedings - Annual Computer Security Applications Conference, ACSAC
T2 - 22nd Annual Computer Security Applications Conference, ACSAC 2006
Y2 - 11 December 2006 through 15 December 2006
ER -