Authors
Yuval Yarom, Katrina Falkner
Publication date
2014
Conference
23rd USENIX security symposium (USENIX security 14)
Pages
719-732
Description
Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a weakness in the Intel X86 processors, page sharing exposes processes to information leaks. We present FLUSH+ RELOAD, a cache side-channel attack technique that exploits this weakness to monitor access to memory lines in shared pages. Unlike previous cache side-channel attacks, FLUSH+ RELOAD targets the Last-Level Cache (ie L3 on processors with three cache levels). Consequently, the attack program and the victim do not need to share the execution core.
Total citations
2014201520162017201820192020202120222023202419679513219225728426826028281
Scholar articles
Y Yarom, K Falkner - 23rd USENIX security symposium (USENIX security 14 …, 2014