March 2, 2023, 2:10 a.m. | David A. Kaplan

cs.CR updates on arXiv.org arxiv.org

In cache-based side channel attacks, an attacker infers information about the
victim based on the presence, or lack thereof, of one or more cachelines.
Determining a cacheline's presence, which we refer to as "reading the signal",
typically requires testing the access time of the line using a suitably high
precision timer. In this paper we introduce novel gadgets which leverage CPU
speculation to enable modification of these signals, before they are read, for
a variety of purposes. First, these gadgets …

access amplification attacks cache channel cpu enable gadgets high information modification novel optimization signal signals testing victim

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC