Overview
Explore a 20-minute IEEE conference talk that delves into the practical implementation of Prime+Probe side-channel attacks targeting the last-level cache. Learn about the attack's effectiveness, its ability to create a covert channel, and its cross-core, cross-VM capabilities demonstrated on multiple versions of GnuPG. Discover how this technique achieves high attack resolution without exploiting OS or virtual machine monitor weaknesses or relying on shared memory between attacker and victim. Gain insights into cache structure, challenges, and attack strategies, including the sliding window technique and multiplication code analysis. Understand the process of finding multipliers and clustering in the context of last-level cache attacks, and grasp the implications for computer security and privacy.
Syllabus
Introduction
Motivation
Why LastLevel Cache
Cache Structure
Challenges
Methods
Slow LastLevel Cache
Slices
Attack Strategy
Sliding Window
Multiplication Code
Finding Multipliers
Clustering
Summary
Conclusion
Taught by
IEEE Symposium on Security and Privacy