Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/9205
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTownley, Daniel-
dc.contributor.authorArikan, Kerem-
dc.contributor.authorLiu, Yu David-
dc.contributor.authorPonomarev, Dmitry-
dc.contributor.authorErgin, Oğuz-
dc.date.accessioned2022-11-30T19:36:16Z-
dc.date.available2022-11-30T19:36:16Z-
dc.date.issued2022-
dc.identifier.isbn978-1-939133-31-1-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/9205-
dc.description31st USENIX Security Symposium -- AUG 10-12, 2022 -- Boston, MAen_US
dc.description.abstractThe security of isolated execution architectures such as Intel SGX has been significantly threatened by the recent emergence of side-channel attacks. Cache side-channel attacks allow adversaries to leak secrets stored inside isolated enclaves without having direct access to the enclave memory. In some cases, secrets can be leaked even without having the knowledge of the victim application code or having OS-level privileges. We propose the concept of Composable Cachelets (CC), a new scalable strategy to dynamically partition the last-level cache (LLC) for completely isolating enclaves from other applications and from each other. CC supports enclave isolation in caches with the capability to dynamically readjust the cache capacity as enclaves are created and destroyed. We present a cache-aware and enclave-aware operational semantics to help rigorously establish security properties of CC, and we experimentally demonstrate that CC thwarts side-channel attacks on caches with modest performance and complexity impact.en_US
dc.description.sponsorshipUSENIX Assoc,Meta,Google,NSF,Baidu,Chainlink,IBM,Intel Secur,Red Canary,Mercari,Paloalto,Technol Innovat Insten_US
dc.description.sponsorshipNSF [CNS-2053391]en_US
dc.description.sponsorshipWe would like to thank Atsuko Shimizu, Williams Zhang Cen, Abraham Farrell and Barry Williams for insightful discussions. We would also like to thank anonymous reviewers for their valuable feedback. This research was supported in part by NSF Award CNS-2053391.en_US
dc.language.isoenen_US
dc.publisherUsenix Assocen_US
dc.relation.ispartofProceedings of The 31st Usenix Security Symposiumen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectHigh-Performanceen_US
dc.titleComposable Cachelets: Protecting Enclaves from Cache Side-Channel Attacksen_US
dc.typeConference Objecten_US
dc.identifier.startpage2839en_US
dc.identifier.endpage2856en_US
dc.identifier.wosWOS:000855237504010en_US
dc.identifier.scopus2-s2.0-85140960218en_US
dc.institutionauthorErgin, Oğuz-
dc.authorscopusid57209837612-
dc.authorscopusid57702277900-
dc.authorscopusid57949058100-
dc.authorscopusid57210403461-
dc.authorscopusid6603141208-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.ozel2022v3_Editen_US
item.grantfulltextnone-
item.openairetypeConference Object-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

WEB OF SCIENCETM
Citations

3
checked on Jun 29, 2024

Page view(s)

86
checked on Jul 1, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.