YoVDO

Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Software Security Courses Cache Attacks Courses

Course Description

Overview

Explore a groundbreaking presentation from USENIX Security '18 that challenges existing software-based defenses against cache attacks. Delve into the concept of indirect cache attacks, focusing on the Malicious Management Unit (MMU) as a potential vector for bypassing current security measures. Learn about the vulnerabilities in cache access isolation techniques and the complexities of mitigating arbitrary cache attacks. Examine the PRIME + PROBE method, page coloring, XLATE attacks, page table walks, and translation caches. Investigate the challenges of building eviction sets, reliability concerns, and the effectiveness of current cache defenses. Gain valuable insights into why stopping cache attacks in software is more difficult than previously thought, and understand the implications for future security strategies in computer systems.

Syllabus

Intro
Motivation
PRIME + PROBE
Page coloring
XLATE attacks
Page table walks
Translation Caches
Shared Memory
Building Eviction Sets
Challenges
Reliability
Effectiveness
Cache Defenses
Conclusions


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube