Defeating Hardware Prefetchers in Flush+Reload Side-Channel Attack

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Hardware prefetching can seriously interfere with Flush+Reload cache side channel attack. This interference is not taken into consideration in previous Flush+Reload attacks. In this paper, an improved Flush+Reload is provided which minimizes the impact of hardware prefetchers. Specifically, prefetching is analyzed based on reverse engineering and the result is used to make an evaluation model to evaluate the impact of hardware prefetching on Flush+Reload attacks. Then the model is applied to fine tune the placement of probes in Flush+Reload attack to mitigate the prefetching impact. The experiments show that the approach is effective on the Core i5 processor which is equipped with highly aggressive prefetchers.

Cite

CITATION STYLE

APA

Wang, Z., Peng, S., Jiang, W., & Guo, X. (2021). Defeating Hardware Prefetchers in Flush+Reload Side-Channel Attack. IEEE Access, 9, 21251–21257. https://doi.org/10.1109/ACCESS.2021.3056190

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free