NetCAT - Practical Cache Attacks from the Network

NetCAT - Practical Cache Attacks from the Network

IEEE Symposium on Security and Privacy via YouTube Direct link

Evaluation

16 of 21

16 of 21

Evaluation

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

NetCAT - Practical Cache Attacks from the Network

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Cache Attack from the Network
  3. 3 Cache Attacks (prev.)
  4. 4 The Memory Wall - Caches
  5. 5 PRIME+PROBE
  6. 6 Cache Hits & Misses
  7. 7 Background - DDIO
  8. 8 Background - Why is DDIO needed?
  9. 9 Network Cache Attack - Main Challenges
  10. 10 Reverse Engineering DDIO • How does DDIO interact with the LLC
  11. 11 Reads served from memory vs LLC
  12. 12 DDIO Allocation Limitation
  13. 13 Detecting the NIC's ring buffer in LLC
  14. 14 Tracking the Ring Buffer
  15. 15 Map inter-packet arrival times to Words
  16. 16 Evaluation
  17. 17 CVE-2019-11184 - Demo
  18. 18 Attacker measures ring buffer activity
  19. 19 Mitigation
  20. 20 The name of our paper
  21. 21 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.