Главная
Study mode:
on
1
Intro
2
Motivation
3
PRIME + PROBE
4
Page coloring
5
XLATE attacks
6
Page table walks
7
Translation Caches
8
Shared Memory
9
Building Eviction Sets
10
Challenges
11
Reliability
12
Effectiveness
13
Cache Defenses
14
Conclusions
Description:
Explore a groundbreaking presentation from USENIX Security '18 that challenges existing software-based defenses against cache attacks. Delve into the concept of indirect cache attacks, focusing on the Malicious Management Unit (MMU) as a potential vector for bypassing current security measures. Learn about the vulnerabilities in cache access isolation techniques and the complexities of mitigating arbitrary cache attacks. Examine the PRIME + PROBE method, page coloring, XLATE attacks, page table walks, and translation caches. Investigate the challenges of building eviction sets, reliability concerns, and the effectiveness of current cache defenses. Gain valuable insights into why stopping cache attacks in software is more difficult than previously thought, and understand the implications for future security strategies in computer systems.

Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think

USENIX
Add to list