|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Improving Cache Performance while Mitigating Software Side-Channel Attacks
If you have a question about this talk, please contact Joseph Bonneau.
Improving the security of computers has traditionally been associated with degrading performance. Princeton researchers show a rather surprising result where both security and performance can be improved by rethinking cache architecture. Cache subsystems bridge the speed gap between processors and main memory, and are essential for improving the performance of computer systems. However, the fundamental difference in cache hit versus miss timing can be exploited to leak secret information, such as the cryptographic keys of AES and RSA ciphers. Almost all computers are vulnerable to these software side-channel attacks. Software solutions are algorithm-specific, do not apply to legacy programs and severely degrade performance. A generic hardware solution that applies to all software, does not degrade performance, and prevents all access-based cache side-channel attacks, is desirable. New security-aware cache architectures, presented in ISCA2007 , were the Random Permutation cache (RPcache) and the Partition Locked cache (PLcache). A novel cache architecture (Micro2008) is presented that not only improves security, but also improves performance, achieving the best cache access time, miss-rate and power consumption of existing classes of cache architectures. Fault-tolerance, hot-spot mitigation and flexible partitioning are additional benefits.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsLooking at Language Acquisition (LALA) XIII - A meeting of Essex and Cambridge PhD students Research Seminars - Department of Biochemistry Virology Seminars
Other talksReporting from Extreme Environments Sino-Russian Oil and Gas Cooperation: Where it stands and how far it can go? Extreme Politics Storing and updating models of the world for behavioural control 'Researching Children's Histories under the Third Reich: Some Challenges Explored' Multi-scale analysis of low carbon energy systems