A Security Verification Template to Assess Cache Architecture Vulnerabilities
In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of t...
Saved in:
Published in | 2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) pp. 1 - 6 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.04.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of the attacks. Hence, an effective verification environment to automatically verify the cache security for all side-channel attacks is still missing. To address this shortcoming, we propose a security verification methodology that formally verifies cache designs against cache side-channel vulnerabilities. Results show that this verification template is a straightforward, automated method in verifying cache invulnerability. |
---|---|
AbstractList | In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of the attacks. Hence, an effective verification environment to automatically verify the cache security for all side-channel attacks is still missing. To address this shortcoming, we propose a security verification methodology that formally verifies cache designs against cache side-channel vulnerabilities. Results show that this verification template is a straightforward, automated method in verifying cache invulnerability. |
Author | Taouil, Mottaqiallah Paul, Kolin Ghasempouri, Tara Reinbrecht, Cezar Raik, Jaan Hamdioui, Said |
Author_xml | – sequence: 1 givenname: Tara surname: Ghasempouri fullname: Ghasempouri, Tara organization: Tallinn University of Technology – sequence: 2 givenname: Jaan surname: Raik fullname: Raik, Jaan organization: Tallinn University of Technology – sequence: 3 givenname: Kolin surname: Paul fullname: Paul, Kolin organization: Tallinn University of Technology – sequence: 4 givenname: Cezar surname: Reinbrecht fullname: Reinbrecht, Cezar organization: Delft Univeristy of Technology – sequence: 5 givenname: Said surname: Hamdioui fullname: Hamdioui, Said organization: Delft Univeristy of Technology – sequence: 6 givenname: Mottaqiallah surname: Taouil fullname: Taouil, Mottaqiallah organization: Delft Univeristy of Technology |
BookMark | eNotj81OAjEURqvRRECewIV9gcHbWzqdLicD_iQYFyBb0tY7oWYYSNtZ8PaSyOY7OZuTfGN21x97YuxZwEwIMC-LxbJZK6hKnCEgzAwYpUHfsLHQWAljZKVv2QjnWhYohH5g05R-AUCUFzV6xD5rviY_xJDPfEsxtMHbHI4939Dh1NlMPB95nRKlxBvr98Tr6Pchk89DJL4dup6idaELOVB6ZPet7RJNr5yw79flpnkvVl9vH029KgIqzAVVEp1ppXWls8KinoNGjc5J8g68VS2iBIs_aEu4rEEqUQmtVOvn6LycsKf_biCi3SmGg43n3fW9_APW3lF3 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/DDECS50862.2020.9095707 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1728199387 9781728199382 |
EISSN | 2473-2117 |
EndPage | 6 |
ExternalDocumentID | 9095707 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i252t-e832b9f3ab6ba1a27407272bb3ecb0ca5f2230a2d2a602d292e6251755fc42bc3 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:26:56 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i252t-e832b9f3ab6ba1a27407272bb3ecb0ca5f2230a2d2a602d292e6251755fc42bc3 |
OpenAccessLink | https://repository.tudelft.nl/islandora/object/uuid%3A772d95ba-e6d5-4de9-b76b-bb27ac6e1dc9/datastream/OBJ/download |
PageCount | 6 |
ParticipantIDs | ieee_primary_9095707 |
PublicationCentury | 2000 |
PublicationDate | 2020-April |
PublicationDateYYYYMMDD | 2020-04-01 |
PublicationDate_xml | – month: 04 year: 2020 text: 2020-April |
PublicationDecade | 2020 |
PublicationTitle | 2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) |
PublicationTitleAbbrev | DDECS |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001621197 |
Score | 1.8080479 |
Snippet | In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Analytical models Ciphers Computer architecture Hardware Side-channel attacks |
Title | A Security Verification Template to Assess Cache Architecture Vulnerabilities |
URI | https://ieeexplore.ieee.org/document/9095707 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JawMhFJY0p_bSJSnd8dBjnTiOM8ZjyEIopBSykFtQ5wmlaRLCzKW_vjozTdLSQy8igiiKvu1730PoUTCjnCgAwi0VhAPnRHKhiGI2ZtLYsG0KlO9LMpzy53k8r6GnXS4MABTgMwh8t4jlp2uTe1dZSzp9QPjU8SMhZZmrtfenJJ6rTFQQrpDKVq_X745jr7I7M5DRoJr9o4xKIUUGp2j0vX4JHnkP8kwH5vMXNeN_N3iGmvt8Pfy6k0TnqAarC3RyQDXYQKMOHlel6vDMjdnKV4cn8LFZOoUTZ2tcRoBx15M8485BiAHP8qWnpy6QtM62bqLpoD_pDklVSoG8sZhlBNzD1dJGSidahcqZotRHYLWOwGhqVGydmkAVS5lKqGslg8STmcWxNZxpE12i-mq9giuE01Qx4354Zq178Fa1KYewnSaKOdsIInGNGv5gFpuSLWNRncnN38O36NhfTomFuUP1bJvDvRPzmX4o7vcLyZ2n7w |
link.rule.ids | 310,311,783,787,792,793,799,23942,23943,25152,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LS8MwHA5jHtSLj018m4NH26VpmrbHsQdTtyHswW4jSX8BcW5D2ot_vUlbtykevJQSUggJ6e_1fd8PofuQKmFMAThMk9BhwJgTs1A4guqAxkp7kcpRvkPem7CnWTCroIcNFwYAcvAZuPY1r-UnK5XZVFkjNv5AaKnje8avjnjB1tpmVLhVKwtLEJdH4ka73WmN7EzLuKLELb__0UgltyPdIzT4XkEBH3lzs1S66vOXOON_l3iM6lvGHn7Z2KITVIHlKTrcERusoUETj8pmdXhqxnSZrcNjeF8vjMuJ0xUuasC4ZWWecXOnyICn2cIKVOdYWhNd19Gk2xm3ek7ZTMF5pQFNHTBXV8baF5JL4QkTjBJbg5XSByWJEoE2jgIRNKGCE_OMKXArZxYEWjEqlX-GqsvVEs4RThJBlfnHU63NldciIgy8KOGCmugI_PAC1ezGzNeFXsa83JPLv4fv0H5vPOjP-4_D5yt0YA-qQMZco2r6kcGNMfqpvM3P-gvAmas6 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2020+23rd+International+Symposium+on+Design+and+Diagnostics+of+Electronic+Circuits+%26+Systems+%28DDECS%29&rft.atitle=A+Security+Verification+Template+to+Assess+Cache+Architecture+Vulnerabilities&rft.au=Ghasempouri%2C+Tara&rft.au=Raik%2C+Jaan&rft.au=Paul%2C+Kolin&rft.au=Reinbrecht%2C+Cezar&rft.date=2020-04-01&rft.pub=IEEE&rft.eissn=2473-2117&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FDDECS50862.2020.9095707&rft.externalDocID=9095707 |