In this paper, we identify that memory performance plays a crucial role in the feasibility and effectiveness for performing denial-of-service attacks on shared cache. Based on this insight, we introduce new cache DoS attacks, which can be mounted from the user-space and can cause extreme worst-case execution time (WCET) impacts to cross-core victims -- even if the shared cache is partitioned -- by taking advantage of the platform's memory address mapping information and HugePage support. We deploy these enhanced attacks on two popular embedded out-of-order multicore platforms using both synthetic and real-world benchmarks. The proposed DoS attacks achieve up to 111X WCET increases on the tested platforms.
翻译:在本文中,我们指出,记忆性能在对共享缓存进行拒绝服务袭击的可行性和有效性方面发挥着关键作用。基于这一洞察力,我们引入了新的缓存DoS袭击,这些袭击可以从用户空间启动,并可能通过利用平台的内存地址映射信息和巨型定位支持,给跨核心受害者造成极端最坏的处决时间(WCET)影响 -- -- 即使共享缓存被分割 -- -- 利用平台的内存地址映射信息和巨型定位支持。我们用合成和现实世界基准,对两个流行的内嵌的多功能外多功能平台部署了这些强化袭击。拟议的缓存袭击在测试平台上达到111X WCET增加值。