CaSA: End-to-end quantitative security analysis of randomly mapped caches

© 2020 IEEE. It is well known that there are micro-architectural vulnerabilities that enable an attacker to use caches to exfiltrate secrets from a victim. These vulnerabilities exploit the fact that the attacker can detect cache lines that were accessed by the victim. Therefore, architects have loo...

Full description

Bibliographic Details
Main Authors: Bourgeat, T, Drean, J, Yang, Y, Tsai, L, Emer, J, Yan, M
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: IEEE 2021
Online Access:https://hdl.handle.net/1721.1/137794