Главная
Study mode:
on
1
Intro
2
Cache Attack from the Network
3
Cache Attacks (prev.)
4
The Memory Wall - Caches
5
PRIME+PROBE
6
Cache Hits & Misses
7
Background - DDIO
8
Background - Why is DDIO needed?
9
Network Cache Attack - Main Challenges
10
Reverse Engineering DDIO • How does DDIO interact with the LLC
11
Reads served from memory vs LLC
12
DDIO Allocation Limitation
13
Detecting the NIC's ring buffer in LLC
14
Tracking the Ring Buffer
15
Map inter-packet arrival times to Words
16
Evaluation
17
CVE-2019-11184 - Demo
18
Attacker measures ring buffer activity
19
Mitigation
20
The name of our paper
21
Conclusion
Description:
Explore a groundbreaking IEEE conference talk on NetCAT, a practical cache attack from the network. Delve into the security implications of Direct Cache Access (DCA) on modern Intel processors, focusing on the Last Level Cache (LLC) shared between CPU and peripheral devices. Discover how NetCAT enables network-based PRIME+PROBE cache attacks, potentially compromising sensitive information in both cooperative and adversarial settings. Learn about the reverse engineering of Data-Direct I/O (DDIO), its impact on processor security, and a demonstrative keystroke timing attack on SSH connections. Gain insights into the challenges, implementation, and evaluation of NetCAT, including CVE-2019-11184. Understand the importance of cautious microarchitectural component sharing with peripherals and potential mitigation strategies for this novel security threat.

NetCAT - Practical Cache Attacks from the Network

IEEE
Add to list
0:00 / 0:00