Skip to main content

Showing 1–4 of 4 results for author: Thoma, J P

.
  1. arXiv:2312.06235  [pdf, other

    cs.CR

    On The Effect of Replacement Policies on The Security of Randomized Cache Architectures

    Authors: Moritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu

    Abstract: Randomizing the map** of addresses to cache entries has proven to be an effective technique for hardening caches against contention-based attacks like Prime+Prome. While attacks and defenses are still evolving, it is clear that randomized caches significantly increase the security against such attacks. However, one aspect that is missing from most analyses of randomized cache architectures is th… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  2. Write Me and I'll Tell You Secrets -- Write-After-Write Effects On Intel CPUs

    Authors: Jan Philipp Thoma, Tim Güneysu

    Abstract: There is a long history of side channels in the memory hierarchy of modern CPUs. Especially the cache side channel is widely used in the context of transient execution attacks and covert channels. Therefore, many secure cache architectures have been proposed. Most of these architectures aim to make the construction of eviction sets infeasible by randomizing the address-to-cache map**. In this pa… ▽ More

    Submitted 5 September, 2022; originally announced September 2022.

    Comments: Accepted at the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)

  3. arXiv:2104.11469  [pdf, other

    cs.CR cs.AR

    ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions

    Authors: Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu

    Abstract: In the recent past, we have witnessed the shift towards attacks on the microarchitectural CPU level. In particular, cache side-channels play a predominant role as they allow an attacker to exfiltrate secret information by exploiting the CPU microarchitecture. These subtle attacks exploit the architectural visibility of conflicting cache addresses. In this paper, we present ClepsydraCache, which mi… ▽ More

    Submitted 18 August, 2022; v1 submitted 23 April, 2021; originally announced April 2021.

  4. BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster

    Authors: Jan Philipp Thoma, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein

    Abstract: Recent research has revealed an ever-growing class of microarchitectural attacks that exploit speculative execution, a standard feature in modern processors. Proposed and deployed countermeasures involve a variety of compiler updates, firmware updates, and hardware updates. None of the deployed countermeasures have convincing security arguments, and many of them have already been broken. The obv… ▽ More

    Submitted 5 May, 2021; v1 submitted 31 July, 2020; originally announced July 2020.

    Comments: Preprint