Microarchitectural Attacks and Security

  1. Cache-Based Side Channel Attacks
    1. Cache Attack Fundamentals
      1. Cache State Observation Techniques
        1. Timing Measurement Methods
          1. Cache Line Granularity Effects
            1. Cross-Core vs Same-Core Attacks
            2. Access-Driven Attack Methods
              1. Prime+Probe Attacks
                1. Attack Setup Phase
                  1. Priming Cache Sets
                    1. Victim Execution Phase
                      1. Probing and Measurement
                        1. Noise Reduction Techniques
                          1. Multi-Set Prime+Probe
                          2. Evict+Time Attacks
                            1. Cache Eviction Strategies
                              1. Timing Measurement Setup
                                1. Statistical Analysis Methods
                                  1. Attack Limitations
                                2. Trace-Driven Attack Methods
                                  1. Flush+Reload Attacks
                                    1. Shared Memory Requirements
                                      1. Cache Line Flushing Techniques
                                        1. Reload Timing Measurement
                                          1. Attack Synchronization
                                            1. Cross-Process Applications
                                            2. Evict+Reload Attacks
                                              1. Eviction Set Construction
                                                1. Reload Phase Implementation
                                                  1. Comparison with Flush+Reload
                                                  2. Flush+Flush Attacks
                                                    1. Flush Timing Variations
                                                      1. Detection Evasion Properties
                                                        1. Implementation Challenges
                                                      2. Advanced Cache Attack Techniques
                                                        1. Cross-Core Cache Attacks
                                                          1. Shared Cache Exploitation
                                                            1. Inter-Core Communication
                                                              1. Synchronization Challenges
                                                              2. Cache Template Attacks
                                                                1. Template Construction
                                                                  1. Pattern Matching Techniques
                                                                  2. Automated Cache Attack Tools
                                                                    1. Attack Automation Frameworks
                                                                      1. Parameter Optimization