SoK: So, You Think You Know All About Secure Randomized Caches?
USENIX Security
🏆 Distinguished Artifact Award
Author List
Hari Bhavsar*, Anubhav Bhatla*, Sayandeep Saha, Biswabandan Panda
Abstract
Over the past decade, numerous side-channel attacks on
shared resources, such as the Last-Level Cache (LLC), have
exposed security risks in the form of flush-based,
conflict-based, and occupancy-based attacks, driving the development
of secure cache designs. To defend against conflict-based
attacks, which is one of the most effective classes of
side-channel attacks, many modern designs randomize LLC set
indexing to hinder eviction set construction.
Various randomized cache designs have been proposed recently,
offering distinct security guarantees. While these designs incorporate
several microarchitectural modifications (we call them security knobs)
over the conventional set-associative cache to
ensure security, the individual impact of these microarchitectural
modifications has never been evaluated. This leaves a
gap in the understanding of randomized LLCs – the design
space has not been explored completely and systematically.
In this SoK, we identify and systematically analyze the
design knobs employed in state-of-the-art secure randomized
cache designs that mitigate conflict-based attacks. Using
conventional set-associative caches as our baseline, we study
five key knobs: skewing, extra invalid tags, high associativity,
replacement policy, and remapping. We also evaluate their
impact on occupancy-based attacks. Our findings show that
no single knob provides a comprehensive security guarantee.
Instead, only specific combinations of knobs yield effective
protection, while others offer little to no security benefit.