In this paper, we analyse the results and claims presented in the paper \emph{`Are Randomized Caches Truly Random? Formal Analysis of Randomized Partitioned Caches'}, presented at HPCA conference 2023. In addition, we also analyse the applicability of `Bucket and Ball' analytical model presented in MIRAGE (Usenix Security 2021) for its security estimation. We put forth the fallacies in the original bucket and ball model and discuss its implications. Finally, we demonstrate a cache occupancy attack on MIRAGE with just $10\%$ of total cache capacity and extend the framework to establish a covert channel and a template-based fingerprinting attack.
翻译:摘要:本文分析2023年HPCA会议上的论文“随机分区缓存的形式分析:随机分区缓存是否真正随机?“中提出的结果和观点。此外,我们还分析了在MIRAGE上提出的“桶和球”分析模型对其安全估计的适用性。我们阐述了原始桶和球模型中的谬误并讨论了其影响。最后,我们展示了一个只利用总缓存容量的$10\%$就能进行的缓存占用攻击,并扩展了该框架以建立隐蔽信道和基于模板的指纹攻击。