Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/9205
Title: Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks
Authors: Townley, Daniel
Arikan, Kerem
Liu, Yu David
Ponomarev, Dmitry
Ergin, Oğuz
Keywords: High-Performance
Publisher: Usenix Assoc
Abstract: The security of isolated execution architectures such as Intel SGX has been significantly threatened by the recent emergence of side-channel attacks. Cache side-channel attacks allow adversaries to leak secrets stored inside isolated enclaves without having direct access to the enclave memory. In some cases, secrets can be leaked even without having the knowledge of the victim application code or having OS-level privileges. We propose the concept of Composable Cachelets (CC), a new scalable strategy to dynamically partition the last-level cache (LLC) for completely isolating enclaves from other applications and from each other. CC supports enclave isolation in caches with the capability to dynamically readjust the cache capacity as enclaves are created and destroyed. We present a cache-aware and enclave-aware operational semantics to help rigorously establish security properties of CC, and we experimentally demonstrate that CC thwarts side-channel attacks on caches with modest performance and complexity impact.
Description: 31st USENIX Security Symposium -- AUG 10-12, 2022 -- Boston, MA
URI: https://hdl.handle.net/20.500.11851/9205
ISBN: 978-1-939133-31-1
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection

Show full item record



CORE Recommender

WEB OF SCIENCETM
Citations

5
checked on Nov 9, 2024

Page view(s)

108
checked on Nov 11, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.