VOOZH about

URL: https://cs-people.bu.edu/tromer/papers/cache.pdf


%PDF-1.4 5 0 obj << /S /GoTo /D (0.1) >> endobj 8 0 obj (Abstract) endobj 9 0 obj << /S /GoTo /D (section.1.1) >> endobj 12 0 obj (1 Introduction) endobj 13 0 obj << /S /GoTo /D (subsection.1.1.1) >> endobj 16 0 obj (1.1 Overview) endobj 17 0 obj << /S /GoTo /D (subsection.1.1.2) >> endobj 20 0 obj (1.2 Related Works) endobj 21 0 obj << /S /GoTo /D (section.1.2) >> endobj 24 0 obj (2 Preliminaries) endobj 25 0 obj << /S /GoTo /D (subsection.1.2.1) >> endobj 28 0 obj (2.1 Memory and Cache Structure) endobj 29 0 obj << /S /GoTo /D (subsection.1.2.2) >> endobj 32 0 obj (2.2 Memory Access in AES implementations) endobj 33 0 obj << /S /GoTo /D (subsection.1.2.3) >> endobj 36 0 obj (2.3 Notation) endobj 37 0 obj << /S /GoTo /D (section.1.3) >> endobj 40 0 obj (3 Synchronous Known-Data Attacks) endobj 41 0 obj << /S /GoTo /D (subsection.1.3.1) >> endobj 44 0 obj (3.1 Overview) endobj 45 0 obj << /S /GoTo /D (subsection.1.3.2) >> endobj 48 0 obj (3.2 One-Round Attack) endobj 49 0 obj << /S /GoTo /D (subsection.1.3.3) >> endobj 52 0 obj (3.3 Two-Rounds Attack) endobj 53 0 obj << /S /GoTo /D (subsection.1.3.4) >> endobj 56 0 obj (3.4 Measurement via Evict+Time) endobj 57 0 obj << /S /GoTo /D (subsection.1.3.5) >> endobj 60 0 obj (3.5 Measurement via Prime+Probe) endobj 61 0 obj << /S /GoTo /D (subsection.1.3.6) >> endobj 64 0 obj (3.6 Complications) endobj 65 0 obj << /S /GoTo /D (subsection.1.3.7) >> endobj 68 0 obj (3.7 Experimental Results) endobj 69 0 obj << /S /GoTo /D (subsection.1.3.8) >> endobj 72 0 obj (3.8 Variants and Extensions) endobj 73 0 obj << /S /GoTo /D (section.1.4) >> endobj 76 0 obj (4 Asynchronous Attacks) endobj 77 0 obj << /S /GoTo /D (subsection.1.4.1) >> endobj 80 0 obj (4.1 Overview) endobj 81 0 obj << /S /GoTo /D (subsection.1.4.2) >> endobj 84 0 obj (4.2 One-Round Attack) endobj 85 0 obj << /S /GoTo /D (subsection.1.4.3) >> endobj 88 0 obj (4.3 Measurements) endobj 89 0 obj << /S /GoTo /D (subsection.1.4.4) >> endobj 92 0 obj (4.4 Experimental Results) endobj 93 0 obj << /S /GoTo /D (subsection.1.4.5) >> endobj 96 0 obj (4.5 Variants and Extensions) endobj 97 0 obj << /S /GoTo /D (section.1.5) >> endobj 100 0 obj (5 Countermeasures) endobj 101 0 obj << /S /GoTo /D (subsection.1.5.1) >> endobj 104 0 obj (5.1 Avoiding Memory Accesses) endobj 105 0 obj << /S /GoTo /D (subsection.1.5.2) >> endobj 108 0 obj (5.2 Alternative Lookup Tables) endobj 109 0 obj << /S /GoTo /D (subsection.1.5.3) >> endobj 112 0 obj (5.3 Data-Oblivious Memory Access Pattern) endobj 113 0 obj << /S /GoTo /D (subsection.1.5.4) >> endobj 116 0 obj (5.4 Application-Specific Algorithmic Masking) endobj 117 0 obj << /S /GoTo /D (subsection.1.5.5) >> endobj 120 0 obj (5.5 Cache State Normalization and Process Blocking) endobj 121 0 obj << /S /GoTo /D (subsection.1.5.6) >> endobj 124 0 obj (5.6 Disabling Cache Sharing) endobj 125 0 obj << /S /GoTo /D (subsection.1.5.7) >> endobj 128 0 obj (5.7 Static or Disabled Cache) endobj 129 0 obj << /S /GoTo /D (subsection.1.5.8) >> endobj 132 0 obj (5.8 Dynamic Table Storage) endobj 133 0 obj << /S /GoTo /D (subsection.1.5.9) >> endobj 136 0 obj (5.9 Hiding the Timing) endobj 137 0 obj << /S /GoTo /D (subsection.1.5.10) >> endobj 140 0 obj (5.10 Selective Round Protection) endobj 141 0 obj << /S /GoTo /D (subsection.1.5.11) >> endobj 144 0 obj (5.11 Operating System Support) endobj 145 0 obj << /S /GoTo /D (section.1.6) >> endobj 148 0 obj (6 Conclusions and Implications) endobj 149 0 obj << /S /GoTo /D (subsection.1.6.1) >> endobj 152 0 obj (6.1 Vulnerable Cryptographic Primitives) endobj 153 0 obj << /S /GoTo /D (subsection.1.6.2) >> endobj 156 0 obj (6.2 Vulnerable Systems) endobj 157 0 obj << /S /GoTo /D (subsection.1.6.3) >> endobj 160 0 obj (6.3 Mitigation) endobj 161 0 obj << /S /GoTo /D (section*.1) >> endobj 164 0 obj (References) endobj 165 0 obj << /S /GoTo /D [166 0 R /FitH ] >> endobj 168 0 obj << /Length 3204 /Filter /FlateDecode >> stream xڍ�r������d���OQ���&޲++LJ8��$D �`@q���{�9��������~wc�|��w�|�a��fq���c�iZ.�҄U\ŋ��?�w�*^�WI�|nVARd��Ub����_���V�ĵ݆����nM�mj������?�3Ƞ(�t_�������}Z����߽��E�U�|�I�i�-���Ĕ��oQ��3�WHw�n)rT��?VU�lz!��Y���I,��E�(Ƃ0"t����d�9�_� ���1 �y yFI�.�$�9����'@�$��^j��'d�H�PȄ�$ `��eQ�qRċ$���ϑN�"���w�$��vC���<>#;[������0-A�3G� �<���YD�a�q���WeB �m3G�1*��&]dV�$�8�B�U�"01H:�}��%pU�y��Yf��2� ŀ&��P�Gm��?!{b7�FvG{3 U�F\��ԔV��yj���ͫ21�?[�dS-�W�|�{�\ w�������%'X�Q�F-o:ث����;���� &�l��ET���4�I��P5����|����)��� �� >�̛w��ox���3 �2%��#�wތ�m� 5݌E`�L<���"��(<x�����LƔ)�J/�;92��^�(�Ů������(����pr��7#��A!� �2�[�������Θ` �)�j��nT�?-��X*x#[چ�ߐP;���us�M�`Ad[B�M��욍�PKܵ�h�by�A-Z*r�1�[qt�@L���d?�2\G��e���E5�~/��D h�Jhb!�?�|&�]�6�kb��8���w?�/�Z��6[�O��v�Q5!o�?s.��+W�P꬝ze��< ��Q8 ��@����i���!�x�K���V��B2� * �M�H��kF)��O���w�;Y�i%.4\����d��"a`�N� �[�5- D� ���P �(����Ɠ� ��x�{�����8`�ծaD�!2�rFm�{�b�å�^0������*Hc ��Ȣߩ�om�