Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Last-Level Cache Side-Channel Attacks Are Practical

IEEE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 20-minute IEEE conference talk that delves into the practical implementation of Prime+Probe side-channel attacks targeting the last-level cache. Learn about the attack's effectiveness, its ability to create a covert channel, and its cross-core, cross-VM capabilities demonstrated on multiple versions of GnuPG. Discover how this technique achieves high attack resolution without exploiting OS or virtual machine monitor weaknesses or relying on shared memory between attacker and victim. Gain insights into cache structure, challenges, and attack strategies, including the sliding window technique and multiplication code analysis. Understand the process of finding multipliers and clustering in the context of last-level cache attacks, and grasp the implications for computer security and privacy.

Syllabus

Introduction
Motivation
Why LastLevel Cache
Cache Structure
Challenges
Methods
Slow LastLevel Cache
Slices
Attack Strategy
Sliding Window
Multiplication Code
Finding Multipliers
Clustering
Summary
Conclusion

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Last-Level Cache Side-Channel Attacks Are Practical

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.