The HPCA-2023 paper "Are Randomized Caches Truly Random?" makes the claim that "MIRAGE is broken" while relying on two faulty assumptions: (1) starting from a severely compromised initial state where some sets are already full, and (2) a buggy cipher that does not provide uniformity of randomizing addresses over the cache sets. When we fixed these two shortcomings (starting with valid state and using AES/PRINCE cipher) we do not observe any conflict misses, emphasizing that Mirage remains unbroken. In this paper, we provide an analysis of the faulty assumptions of the HPCA'23 paper and share the code of our analysis along with the paper.
翻译:《HPCA-2023》论文“是否真正随机的随机缓存?”声称「幻影」已经被攻破,但其依赖了两个错误的假设:(1)从一个已经严重受损的初始状态开始 (即某些集合已经满了),和 (2)一个存在缺陷的密码体制,不能提供缓存集合随机地址的均匀性。当我们修正了这两个缺点 (从一个有效的状态开始,并使用AES/PRINCE密码体制) 时,我们没有观察到任何冲突 misses,这强调了「幻影」的未被攻破。本文对《HPCA-2023》论文的错误假设进行了分析,并分享了我们的代码和论文。