Abstract
Through thorough research and experimentation, we arrive at the optimal defense mechanism that we call CACHELIGHT, a lightweight approach for preventing malicious abuse of cache -locking mechanisms. This novel solution leverages both the TZ and virtualization extensions in the ARM architecture to address the vulnerability identified by CACHEKIT. In this chapter, we cover the design, implementation, and implications of CACHELIGHT and how it is used to allow legitimate users to continue to utilize cache locking while giving SW the power to ensure system security by controlling and verifying the use of said mechanisms.
Original language | English (US) |
---|---|
Title of host publication | Frontiers in Hardware Security and Trust |
Publisher | Institution of Engineering and Technology |
Pages | 173-196 |
Number of pages | 24 |
ISBN (Electronic) | 9781785619274 |
DOIs | |
State | Published - Jan 1 2021 |
Keywords
- ARM architecture
- CACHEKIT attack mitigation
- CACHELIGHT
- Cache storage
- Cache-locking mechanisms
- Data security
- File organisation
- Lightweight approach
- Malicious abuse prevention
- Optimal defense mechanism
- Security of data
- System security
- Virtualization extensions
ASJC Scopus subject areas
- General Engineering