Inicio del curso: 3. noviembre 2025

Cache Side-Channel Attacks and Mitigations

Graz University of Technology

Daniel Gruß

Clasificación científica:

  • Ciencias de la computación (102)
  • Ingeniería de la información (202)

Inicio del curso: 3. noviembre 2025

Cache Side-Channel Attacks and Mitigations

Graz University of Technology

Daniel Gruß

  • Duración: 5 unidades
  • Tiempo: 2 horas a la semana
  • Participantes actuales: 9
  • Licencia: CC BY 4.0
  • Inicio del curso: 3. noviembre 2025
  • Fin del curso: -
  • Estado actual: Curso futuro
  • Idiomas disponibles:
    • English ‎(en)‎
Todos los cursos de iMooX son y seguirán siendo gratuitos para todo el mundo. Leer más

Detalles del curso

Contenido del curso

Side channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.

Objetivos de aprendizaje

After completing this course, you will:

  • be able to spot side-channel leakage in simple programmes
  • be able to use software-based side channels to extract secret information
  • be able to connect these security risks with methods to mitigate and close side channels in software

Requisitos previos

No formal prerequisites, but it is expected that you already have started to build up your side-channel security mindset, for instance via the corresponding iMooX course.

Horario del curso

There are 5 parts (episodes+exercises) in this course:

- Episode 1: Down the Rabbit Hole

The flatmates figure out how virtual addresses and caches work, and they start realizing which timing differences might be hidden in there.

- Episode 2: Gone with the Flush

The flatmates discover the Flush+Flush and Evict+Reload attacks and learn a lot about how cache replacement works.

- Episode 3: Optimus Prime+Probe

The flatmates discover the Prime+Probe attack. They realize that it works in cases where Flush+Reload does not work and believe it is something completely new.

- Episode 4: Jonas and the Template of Doom

The flatmates realize that they can scan binaries for cache activity and automatically build cache side-channel attacks with that, forming the concept of Cache Template Attacks. In the end, upon Jonas' suggestion, they retrieve the Template of Doom; but they also attack AES for instance.

- Episode 5: Drama with Manuel

Manuel hurt his leg and cannot move. The timing differences he introduces in the flat activity inspire the discovery of DRAM Addressing (DRAMA) side channels.