URL: https://cs-people.bu.edu/tromer/papers/cache.pdf
%PDF-1.4
5 0 obj
<< /S /GoTo /D (0.1) >>
endobj
8 0 obj
(Abstract)
endobj
9 0 obj
<< /S /GoTo /D (section.1.1) >>
endobj
12 0 obj
(1 Introduction)
endobj
13 0 obj
<< /S /GoTo /D (subsection.1.1.1) >>
endobj
16 0 obj
(1.1 Overview)
endobj
17 0 obj
<< /S /GoTo /D (subsection.1.1.2) >>
endobj
20 0 obj
(1.2 Related Works)
endobj
21 0 obj
<< /S /GoTo /D (section.1.2) >>
endobj
24 0 obj
(2 Preliminaries)
endobj
25 0 obj
<< /S /GoTo /D (subsection.1.2.1) >>
endobj
28 0 obj
(2.1 Memory and Cache Structure)
endobj
29 0 obj
<< /S /GoTo /D (subsection.1.2.2) >>
endobj
32 0 obj
(2.2 Memory Access in AES implementations)
endobj
33 0 obj
<< /S /GoTo /D (subsection.1.2.3) >>
endobj
36 0 obj
(2.3 Notation)
endobj
37 0 obj
<< /S /GoTo /D (section.1.3) >>
endobj
40 0 obj
(3 Synchronous Known-Data Attacks)
endobj
41 0 obj
<< /S /GoTo /D (subsection.1.3.1) >>
endobj
44 0 obj
(3.1 Overview)
endobj
45 0 obj
<< /S /GoTo /D (subsection.1.3.2) >>
endobj
48 0 obj
(3.2 One-Round Attack)
endobj
49 0 obj
<< /S /GoTo /D (subsection.1.3.3) >>
endobj
52 0 obj
(3.3 Two-Rounds Attack)
endobj
53 0 obj
<< /S /GoTo /D (subsection.1.3.4) >>
endobj
56 0 obj
(3.4 Measurement via Evict+Time)
endobj
57 0 obj
<< /S /GoTo /D (subsection.1.3.5) >>
endobj
60 0 obj
(3.5 Measurement via Prime+Probe)
endobj
61 0 obj
<< /S /GoTo /D (subsection.1.3.6) >>
endobj
64 0 obj
(3.6 Complications)
endobj
65 0 obj
<< /S /GoTo /D (subsection.1.3.7) >>
endobj
68 0 obj
(3.7 Experimental Results)
endobj
69 0 obj
<< /S /GoTo /D (subsection.1.3.8) >>
endobj
72 0 obj
(3.8 Variants and Extensions)
endobj
73 0 obj
<< /S /GoTo /D (section.1.4) >>
endobj
76 0 obj
(4 Asynchronous Attacks)
endobj
77 0 obj
<< /S /GoTo /D (subsection.1.4.1) >>
endobj
80 0 obj
(4.1 Overview)
endobj
81 0 obj
<< /S /GoTo /D (subsection.1.4.2) >>
endobj
84 0 obj
(4.2 One-Round Attack)
endobj
85 0 obj
<< /S /GoTo /D (subsection.1.4.3) >>
endobj
88 0 obj
(4.3 Measurements)
endobj
89 0 obj
<< /S /GoTo /D (subsection.1.4.4) >>
endobj
92 0 obj
(4.4 Experimental Results)
endobj
93 0 obj
<< /S /GoTo /D (subsection.1.4.5) >>
endobj
96 0 obj
(4.5 Variants and Extensions)
endobj
97 0 obj
<< /S /GoTo /D (section.1.5) >>
endobj
100 0 obj
(5 Countermeasures)
endobj
101 0 obj
<< /S /GoTo /D (subsection.1.5.1) >>
endobj
104 0 obj
(5.1 Avoiding Memory Accesses)
endobj
105 0 obj
<< /S /GoTo /D (subsection.1.5.2) >>
endobj
108 0 obj
(5.2 Alternative Lookup Tables)
endobj
109 0 obj
<< /S /GoTo /D (subsection.1.5.3) >>
endobj
112 0 obj
(5.3 Data-Oblivious Memory Access Pattern)
endobj
113 0 obj
<< /S /GoTo /D (subsection.1.5.4) >>
endobj
116 0 obj
(5.4 Application-Specific Algorithmic Masking)
endobj
117 0 obj
<< /S /GoTo /D (subsection.1.5.5) >>
endobj
120 0 obj
(5.5 Cache State Normalization and Process Blocking)
endobj
121 0 obj
<< /S /GoTo /D (subsection.1.5.6) >>
endobj
124 0 obj
(5.6 Disabling Cache Sharing)
endobj
125 0 obj
<< /S /GoTo /D (subsection.1.5.7) >>
endobj
128 0 obj
(5.7 Static or Disabled Cache)
endobj
129 0 obj
<< /S /GoTo /D (subsection.1.5.8) >>
endobj
132 0 obj
(5.8 Dynamic Table Storage)
endobj
133 0 obj
<< /S /GoTo /D (subsection.1.5.9) >>
endobj
136 0 obj
(5.9 Hiding the Timing)
endobj
137 0 obj
<< /S /GoTo /D (subsection.1.5.10) >>
endobj
140 0 obj
(5.10 Selective Round Protection)
endobj
141 0 obj
<< /S /GoTo /D (subsection.1.5.11) >>
endobj
144 0 obj
(5.11 Operating System Support)
endobj
145 0 obj
<< /S /GoTo /D (section.1.6) >>
endobj
148 0 obj
(6 Conclusions and Implications)
endobj
149 0 obj
<< /S /GoTo /D (subsection.1.6.1) >>
endobj
152 0 obj
(6.1 Vulnerable Cryptographic Primitives)
endobj
153 0 obj
<< /S /GoTo /D (subsection.1.6.2) >>
endobj
156 0 obj
(6.2 Vulnerable Systems)
endobj
157 0 obj
<< /S /GoTo /D (subsection.1.6.3) >>
endobj
160 0 obj
(6.3 Mitigation)
endobj
161 0 obj
<< /S /GoTo /D (section*.1) >>
endobj
164 0 obj
(References)
endobj
165 0 obj
<< /S /GoTo /D [166 0 R /FitH ] >>
endobj
168 0 obj <<
/Length 3204
/Filter /FlateDecode
>>
stream
xڍ�r������d���OQ���&++LJ8��$D �`@q���{�9��������~wc�|��w�|�a��fq���c�iZ.�҄U\ŋ��?�w�*^�WI�|nVARd��Ub����_���V�ĵ݆����nM�mj������?�3Ƞ(�t_�������}Z����߽��E�U�|�I�i�-���Ĕ��oQ��3�WHw�n)rT��?VU�lz!��Y���I,��E�(Ƃ0"t����d�9�_� ���1�yyFI�.�$�9����'@�$��^j��'d�H�PȄ�$`��eQ�qRċ$���ϑN�"���w�$��vC���<>#;[������0-A�3G��<���YD�a�q���WeB�m3G�1*��&]dV�$�8�B�U�"01H:�}��%pU�y��Yf��2�
ŀ&��P�Gm��?!{b7�FvG{3U�F\��ԔV��yj���ͫ21�?[�dS-�W�|�{�\w�������%'X�Q�F-o:ث����;���� &�l��ET���4�I��P5����|����)��� ��
>�̛w��ox���3 �2%��#�wތ�m�5E`�L<���"��(<x�����LƔ)�J/�;92��^�(�Ů������(����pr��7#��A!� �2�[�������Θ`
�)�j��nT�?-��X*x#[چ�ߐP;���us�M�`Ad[B�M��욍�PKܵ�h�by�A-Z*r�1�[qt�@L���d?�2\G��e���E5�~/��Dh�Jhb!�?�|&�]�6�kb��8���w?�/�Z��6[�O��v�Q5!o�?s.��+W�Pze��< ��Q8��@����i���!�x�K���V��B2� *
�M�H��kF)��O���w�;Y�i%.4\����d��"a`�N� �[�5-D�
���P �(����Ɠ�
��x�{�����8`�ծaD�!2�rFm�{�b�å�^0������*Hc
��Ȣߩ�om�