Skip to main content

Showing 1–6 of 6 results for author: Saileshwar, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16256  [pdf, other

    cs.CR cs.AR

    Probabilistic Tracker Management Policies for Low-Cost and Scalable Rowhammer Mitigation

    Authors: Aamer Jaleel, Stephen W. Keckler, Gururaj Saileshwar

    Abstract: This paper focuses on mitigating DRAM Rowhammer attacks. In recent years, solutions like TRR have been deployed in DDR4 DRAM to track aggressor rows and then issue a mitigative action by refreshing neighboring victim rows. Unfortunately, such in-DRAM solutions are resource-constrained (only able to provision few tens of counters to track aggressor rows) and are prone to thrashing based attacks, th… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  2. arXiv:2303.15673  [pdf, other

    cs.AR cs.CR

    The Mirage of Breaking MIRAGE: Refuting the HPCA-2023 Paper "Are Randomized Caches Truly Random?"

    Authors: Gururaj Saileshwar, Moinuddin Qureshi

    Abstract: The HPCA-2023 paper "Are Randomized Caches Truly Random?" makes the claim that "MIRAGE is broken" while relying on two faulty assumptions: (1) starting from a severely compromised initial state where some sets are already full, and (2) a buggy cipher that does not provide uniformity of randomizing addresses over the cache sets. When we fixed these two shortcomings (starting with valid state and us… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

    Comments: Our code repository containing bug-fixes for the HPCA'23 paper's code is at https://github.com/gururaj-s/refuting_HPCA23_randCache

  3. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems

    Authors: Jeonghyun Woo, Gururaj Saileshwar, Prashant J. Nair

    Abstract: As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows), attackers can exploit inter-cell interference through Row Hammer to flip bits in neighboring rows (victim rows). A recent work, called Randomized Row-Swap (RRS), proposed proactively swapping aggressor rows with randomly selected rows… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Journal ref: The 29th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2022)

  4. arXiv:2111.08404  [pdf, other

    cs.CR

    Practical Timing Side Channel Attacks on Memory Compression

    Authors: Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss

    Abstract: Compression algorithms are widely used as they save memory without losing data. However, elimination of redundant symbols and sequences in data leads to a compression side channel. So far, compression attacks have only focused on the compression-ratio side channel, i.e., the size of compressed data,and largely targeted HTTP traffic and website content. In this paper, we present the first memory… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

  5. arXiv:2009.09090  [pdf, other

    cs.CR cs.AR

    MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design

    Authors: Gururaj Saileshwar, Moinuddin Qureshi

    Abstract: Shared processor caches are vulnerable to conflict-based side-channel attacks, where an attacker can monitor access patterns of a victim by evicting victim cache lines using cache-set conflicts. Recent mitigations propose randomized mapping of addresses to cache lines to obfuscate the locations of set-conflicts. However, these are vulnerable to new attacks that discover conflicting sets of address… ▽ More

    Submitted 23 March, 2021; v1 submitted 18 September, 2020; originally announced September 2020.

    Comments: Accepted to appear in USENIX Security 2021. This camera-ready version has an updated Security discussion (Sec-5, Sec-6) and Appendix (new Gem5 results) compared to previous Arxiv version

  6. arXiv:1906.02362  [pdf, other

    cs.CR

    Lookout for Zombies: Mitigating Flush+Reload Attack on Shared Caches by Monitoring Invalidated Lines

    Authors: Gururaj Saileshwar, Moinuddin K. Qureshi

    Abstract: OS-based page sharing is a commonly used optimization in modern systems to reduce memory footprint. Unfortunately, such sharing can cause Flush+Reload cache attacks, whereby a spy periodically flushes a cache line of shared data (using the clflush instruction) and reloads it to infer the access patterns of a victim application. Current proposals to mitigate Flush+Reload attacks are impractical as… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.