Secure Hierarchy-Aware Cache Replacement Policy (SHARP)

نویسندگان

  • Mengjia Yan
  • Bhargava Gopireddy
  • Thomas Shull
  • Josep Torrellas
چکیده

In cache-based side channel attacks, a spy that shares a cache with a victim probes cache locations to extract information on the victim’s access patterns. For example, in evict+reload, the spy repeatedly evicts and then reloads a probe address, checking if the victim has accessed the address in between the two operations. While there are many proposals to combat these cache attacks, they all have limitations: they either hurt performance, require programmer intervention, or can only defend against some types of attacks. This paper makes the following observation for an environment with an inclusive cache hierarchy: when the spy evicts the probe address from the shared cache, the address will also be evicted from the private cache of the victim process, creating an inclusion victim. Consequently, to disable cache attacks, this paper proposes to alter the line replacement algorithm of the shared cache, to prevent a process from creating inclusion victims in the caches of cores running other processes. By enforcing this rule, the spy cannot evict the probe address from the shared cache and, hence, cannot glimpse any information on the victim’s access patterns. We call our proposal SHARP (Secure Hierarchy-Aware cache Replacement Policy). SHARP efficiently defends against all existing cross-core shared-cache attacks, needs only minimal hardware modifications, and requires no code modifications. We implement SHARP in a cycle-level full-system simulator. We show that it protects against real-world attacks, and that it introduces negligible average performance degradation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MAPS: Understanding Metadata Access Patterns in Secure Memory

Secure memory increases both the latency and energy required for memory accesses. To reduce these overheads, computer architects have sought to cache metadata on the processor chip, but placing metadata in a simple cache has not been as effective as expected. With a detailed analysis of metadata access patterns, we clarify myths in metadata caching and provide insight into more efficient cachin...

متن کامل

Performance of Private Cache Replacement Policies for Multicore Processors

Multicore processors have become ubiquitous, both in general-purpose and special-purpose applications. With the number of transistors in a chip continuing to increase, the number of cores in a processor is also expected to increase. Cache replacement policy is an important design parameter of a cache hierarchy. As most of the processor designs have become multicore, there is a need to study cac...

متن کامل

EE 8365 , Advanced Computer Architecture , Spring 2000 ORL – Modified L 2 Cache Replacement Algorithm

A limit to computer system performance is the miss penalty for fetching data and instructions from lower levels in the memory hierarchy. There are two approaches to reducing this penalty. The first approach is to reduce the miss rates of the higher cache levels by utilizing an effective replacement policy that does not replace data that is going to be needed. The second approach is to reduce th...

متن کامل

Managing Off-Chip Bandwidth: A Case for Bandwidth-Friendly Replacement Policy

With the expected increase in the number of on-chip cores the demand for off-chip bus, memory ports, and chip pins increases. This makes off-chip bandwidth a very scarce resource and can severely hurt performance. Off-chip bandwidth is mainly generated by the on-chip cache hierarchy (cache misses and cache writebacks), which depends on the replacement policy. There is a huge body of research on...

متن کامل

Neural Network based Mobility aware Prefetch Caching and Replacement Strategies in Mobile Environment

The Location Based Services (LBS) have ushered the way mobile applications access and manage Mobile Database System (MDS). Caching frequently accessed data into the mobile database environment, is an effective technique to improve the MDS performance. The cache size limitation enforces an optimized cache replacement algorithm to find a suitable subset of items for eviction from the cache. In wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017