A Security Verification Template to Assess Cache Architecture Vulnerabilities

In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of t...

Full description

Saved in:
Bibliographic Details
Published in2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) pp. 1 - 6
Main Authors Ghasempouri, Tara, Raik, Jaan, Paul, Kolin, Reinbrecht, Cezar, Hamdioui, Said, Taouil, Mottaqiallah
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of the attacks. Hence, an effective verification environment to automatically verify the cache security for all side-channel attacks is still missing. To address this shortcoming, we propose a security verification methodology that formally verifies cache designs against cache side-channel vulnerabilities. Results show that this verification template is a straightforward, automated method in verifying cache invulnerability.
AbstractList In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work for a small subset of the attacks. Hence, an effective verification environment to automatically verify the cache security for all side-channel attacks is still missing. To address this shortcoming, we propose a security verification methodology that formally verifies cache designs against cache side-channel vulnerabilities. Results show that this verification template is a straightforward, automated method in verifying cache invulnerability.
Author Taouil, Mottaqiallah
Paul, Kolin
Ghasempouri, Tara
Reinbrecht, Cezar
Raik, Jaan
Hamdioui, Said
Author_xml – sequence: 1
  givenname: Tara
  surname: Ghasempouri
  fullname: Ghasempouri, Tara
  organization: Tallinn University of Technology
– sequence: 2
  givenname: Jaan
  surname: Raik
  fullname: Raik, Jaan
  organization: Tallinn University of Technology
– sequence: 3
  givenname: Kolin
  surname: Paul
  fullname: Paul, Kolin
  organization: Tallinn University of Technology
– sequence: 4
  givenname: Cezar
  surname: Reinbrecht
  fullname: Reinbrecht, Cezar
  organization: Delft Univeristy of Technology
– sequence: 5
  givenname: Said
  surname: Hamdioui
  fullname: Hamdioui, Said
  organization: Delft Univeristy of Technology
– sequence: 6
  givenname: Mottaqiallah
  surname: Taouil
  fullname: Taouil, Mottaqiallah
  organization: Delft Univeristy of Technology
BookMark eNotj81OAjEURqvRRECewIV9gcHbWzqdLicD_iQYFyBb0tY7oWYYSNtZ8PaSyOY7OZuTfGN21x97YuxZwEwIMC-LxbJZK6hKnCEgzAwYpUHfsLHQWAljZKVv2QjnWhYohH5g05R-AUCUFzV6xD5rviY_xJDPfEsxtMHbHI4939Dh1NlMPB95nRKlxBvr98Tr6Pchk89DJL4dup6idaELOVB6ZPet7RJNr5yw79flpnkvVl9vH029KgIqzAVVEp1ppXWls8KinoNGjc5J8g68VS2iBIs_aEu4rEEqUQmtVOvn6LycsKf_biCi3SmGg43n3fW9_APW3lF3
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DDECS50862.2020.9095707
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1728199387
9781728199382
EISSN 2473-2117
EndPage 6
ExternalDocumentID 9095707
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i252t-e832b9f3ab6ba1a27407272bb3ecb0ca5f2230a2d2a602d292e6251755fc42bc3
IEDL.DBID RIE
IngestDate Wed Jun 26 19:26:56 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i252t-e832b9f3ab6ba1a27407272bb3ecb0ca5f2230a2d2a602d292e6251755fc42bc3
OpenAccessLink https://repository.tudelft.nl/islandora/object/uuid%3A772d95ba-e6d5-4de9-b76b-bb27ac6e1dc9/datastream/OBJ/download
PageCount 6
ParticipantIDs ieee_primary_9095707
PublicationCentury 2000
PublicationDate 2020-April
PublicationDateYYYYMMDD 2020-04-01
PublicationDate_xml – month: 04
  year: 2020
  text: 2020-April
PublicationDecade 2020
PublicationTitle 2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)
PublicationTitleAbbrev DDECS
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001621197
Score 1.8080479
Snippet In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Analytical models
Ciphers
Computer architecture
Hardware
Side-channel attacks
Title A Security Verification Template to Assess Cache Architecture Vulnerabilities
URI https://ieeexplore.ieee.org/document/9095707
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JawMhFJY0p_bSJSnd8dBjnTiOM8ZjyEIopBSykFtQ5wmlaRLCzKW_vjozTdLSQy8igiiKvu1730PoUTCjnCgAwi0VhAPnRHKhiGI2ZtLYsG0KlO9LMpzy53k8r6GnXS4MABTgMwh8t4jlp2uTe1dZSzp9QPjU8SMhZZmrtfenJJ6rTFQQrpDKVq_X745jr7I7M5DRoJr9o4xKIUUGp2j0vX4JHnkP8kwH5vMXNeN_N3iGmvt8Pfy6k0TnqAarC3RyQDXYQKMOHlel6vDMjdnKV4cn8LFZOoUTZ2tcRoBx15M8485BiAHP8qWnpy6QtM62bqLpoD_pDklVSoG8sZhlBNzD1dJGSidahcqZotRHYLWOwGhqVGydmkAVS5lKqGslg8STmcWxNZxpE12i-mq9giuE01Qx4354Zq178Fa1KYewnSaKOdsIInGNGv5gFpuSLWNRncnN38O36NhfTomFuUP1bJvDvRPzmX4o7vcLyZ2n7w
link.rule.ids 310,311,783,787,792,793,799,23942,23943,25152,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LS8MwHA5jHtSLj018m4NH26VpmrbHsQdTtyHswW4jSX8BcW5D2ot_vUlbtykevJQSUggJ6e_1fd8PofuQKmFMAThMk9BhwJgTs1A4guqAxkp7kcpRvkPem7CnWTCroIcNFwYAcvAZuPY1r-UnK5XZVFkjNv5AaKnje8avjnjB1tpmVLhVKwtLEJdH4ka73WmN7EzLuKLELb__0UgltyPdIzT4XkEBH3lzs1S66vOXOON_l3iM6lvGHn7Z2KITVIHlKTrcERusoUETj8pmdXhqxnSZrcNjeF8vjMuJ0xUuasC4ZWWecXOnyICn2cIKVOdYWhNd19Gk2xm3ek7ZTMF5pQFNHTBXV8baF5JL4QkTjBJbg5XSByWJEoE2jgIRNKGCE_OMKXArZxYEWjEqlX-GqsvVEs4RThJBlfnHU63NldciIgy8KOGCmugI_PAC1ezGzNeFXsa83JPLv4fv0H5vPOjP-4_D5yt0YA-qQMZco2r6kcGNMfqpvM3P-gvAmas6
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2020+23rd+International+Symposium+on+Design+and+Diagnostics+of+Electronic+Circuits+%26+Systems+%28DDECS%29&rft.atitle=A+Security+Verification+Template+to+Assess+Cache+Architecture+Vulnerabilities&rft.au=Ghasempouri%2C+Tara&rft.au=Raik%2C+Jaan&rft.au=Paul%2C+Kolin&rft.au=Reinbrecht%2C+Cezar&rft.date=2020-04-01&rft.pub=IEEE&rft.eissn=2473-2117&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FDDECS50862.2020.9095707&rft.externalDocID=9095707