all InfoSec news
Abusing Cache Line Dirty States to Leak Information in Commercial Processors. (arXiv:2104.08559v2 [cs.CR] UPDATED)
April 27, 2022, 1:20 a.m. | Yujie Cui, Chun Yang, Xu Cheng
cs.CR updates on arXiv.org arxiv.org
Caches have been used to construct various types of covert and side channels
to leak information. Most existing cache channels exploit the timing difference
between cache hits and cache misses. However, we introduce a new and broader
classification of cache covert channel attacks: Hit+Miss, Hit+Hit, and
Miss+Miss. We highlight that cache misses for cache lines in different states
may have more significant time differences, and these can be used as timing
channels. Based on this classification, we propose a new …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
L2-Network Security Administrator
@ Kyndryl | KIN51515 Mumbai (KIN51515) We Work
Head of Cybersecurity Advisory and Architecture
@ CMA CGM | Marseille, FR
Systems Engineers/Cyber Security Engineers/Information Systems Security Engineer
@ KDA Consulting Inc | Herndon, Virginia, United States
R&D DevSecOps Staff Software Development Engineer 1
@ Sopra Steria | Noida, Uttar Pradesh, India