MATEC Web of Conferences (Jan 2022)

A novel cache based on dynamic mapping against speculative execution attacks

  • Wu Dehua,
  • Xiao Wan’ang,
  • Gao Shan,
  • Gao Wanlin

DOI
https://doi.org/10.1051/matecconf/202235503054
Journal volume & issue
Vol. 355
p. 03054

Abstract

Read online

The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private information by building a leakage channel. Creation of a leakage channel is the basic element for spectre attacks, among which the cache-tag side channel is considered to be the most serious one. To block the leakage channels, a novel cache applies Dynamic Mapping technology, named DmCache, is presented in this paper. DmCache applies a dynamic mapping mechanism to temporarily store all the cache lines polluted by speculative execution and keep invisible when accessing. Then it monitors the head of the reorder buffer to determine which polluted cache line can become visible. In this paper, we demonstrated that Spectre attacks exerted no impact on a processor system equipped with DmCache based on the analysis of the processor’s circuit behaviour, which equipped with the DmCache and under the Spectre attack.

Keywords