Abstract | ||
---|---|---|
We investigate how different categories of microarchitectural state on recent ARM and x86 processors can be used for covert timing channels and how effective architecture-provided mechanisms are in closing them. We find that in recent Intel processors there is no effective way for sanitising the state of the branch prediction unit and that, contrary to often held belief, flushing the translation lookaside buffer on Intel processors does nothing to mitigate attacks based on this component. We further show that in both ARM and x86 architectures flushing all the hardware caches is not effective to close cache-based timing channels. The implication of this is that secure sharing of a processor core in these architectures is not possible, irrespective of cost. |
Year | Venue | Field |
---|---|---|
2016 | arXiv: Cryptography and Security | Cache,Computer science,Flushing,Operating system |
DocType | Volume | Citations |
Journal | abs/1612.04474 | 0 |
PageRank | References | Authors |
0.34 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Qian Ge | 1 | 315 | 9.40 |
Yuval Yarom | 2 | 775 | 35.54 |
Gernot Heiser | 3 | 2525 | 137.42 |