DCUIP Poisoning Attack in Intel x86 Processors
- Authors
- Shin, Youngjoo
- Issue Date
- 8월-2021
- Publisher
- IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
- Keywords
- Intel DCUIP prefetcher; hardware prefetching; microarchitectural; poisoning attack; side-channel attack
- Citation
- IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E104D, no.8, pp.1386 - 1390
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- Volume
- E104D
- Number
- 8
- Start Page
- 1386
- End Page
- 1390
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/137089
- DOI
- 10.1587/transinf.2020EDL8148
- ISSN
- 0916-8532
- Abstract
- Cache prefetching technique brings huge benefits to performance improvement, but it comes at the cost of microarchitectural security in processors. In this letter, we deep dive into internal workings of a DCUIP prefetcher, which is one of prefetchers equipped in Intel processors. We discover that a DCUIP table is shared among different execution contexts in hyperthreading-enabled processors, which leads to another microarchitectural vulnerability. By exploiting the vulnerability, we propose a DCUIP poisoning attack. We demonstrate an AES encryption key can be extracted from an AES-NI implementation by mounting the proposed attack.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.