Title
Do Hardware Cache Flushing Operations Actually Meet Our Expectations?
Abstract
We investigate how different categories of microarchitectural state on recent ARM and x86 processors can be used for covert timing channels and how effective architecture-provided mechanisms are in closing them. We find that in recent Intel processors there is no effective way for sanitising the state of the branch prediction unit and that, contrary to often held belief, flushing the translation lookaside buffer on Intel processors does nothing to mitigate attacks based on this component. We further show that in both ARM and x86 architectures flushing all the hardware caches is not effective to close cache-based timing channels. The implication of this is that secure sharing of a processor core in these architectures is not possible, irrespective of cost.
Year
Venue
Field
2016
arXiv: Cryptography and Security
Cache,Computer science,Flushing,Operating system
DocType
Volume
Citations 
Journal
abs/1612.04474
0
PageRank 
References 
Authors
0.34
0
3
Name
Order
Citations
PageRank
Qian Ge13159.40
Yuval Yarom277535.54
Gernot Heiser32525137.42