Abstract

Through thorough research and experimentation, we arrive at the optimal defense mechanism that we call CACHELIGHT, a lightweight approach for preventing malicious abuse of cache -locking mechanisms. This novel solution leverages both the TZ and virtualization extensions in the ARM architecture to address the vulnerability identified by CACHEKIT. In this chapter, we cover the design, implementation, and implications of CACHELIGHT and how it is used to allow legitimate users to continue to utilize cache locking while giving SW the power to ensure system security by controlling and verifying the use of said mechanisms.

Original languageEnglish (US)
Title of host publicationFrontiers in Hardware Security and Trust
PublisherInstitution of Engineering and Technology
Pages173-196
Number of pages24
ISBN (Electronic)9781785619274
DOIs
StatePublished - Jan 1 2021

Keywords

  • ARM architecture
  • CACHEKIT attack mitigation
  • CACHELIGHT
  • Cache storage
  • Cache-locking mechanisms
  • Data security
  • File organisation
  • Lightweight approach
  • Malicious abuse prevention
  • Optimal defense mechanism
  • Security of data
  • System security
  • Virtualization extensions

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Mitigating the CACHEKIT attack'. Together they form a unique fingerprint.

Cite this