Début du cours: 3. novembre 2025

Cache Side-Channel Attacks and Mitigations

Graz University of Technology

Daniel Gruß

Classification scientifique:

  • Sciences informatiques (102)
  • Ingénierie de l’information (202)

Début du cours: 3. novembre 2025

Cache Side-Channel Attacks and Mitigations

Graz University of Technology

Daniel Gruß

  • Champ d'application: 5 unités
  • Travail: 2 heures par semaine
  • Participants actuels: 9
  • Licence: CC BY 4.0
  • Début du cours: 3. novembre 2025
  • Fin du cours: -
  • Situation actuelle: Cours à venir
  • Langues disponibles:
    • English ‎(en)‎
Tous les cours sur iMooX sont et resteront gratuits pour tous. En savoir plus

Détails du cours

Contenu du cours

Side channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.

Objectifs pédagogiques

After completing this course, you will:

  • be able to spot side-channel leakage in simple programmes
  • be able to use software-based side channels to extract secret information
  • be able to connect these security risks with methods to mitigate and close side channels in software

Conditions préalables

No formal prerequisites, but it is expected that you already have started to build up your side-channel security mindset, for instance via the corresponding iMooX course.

Calendrier des cours

There are 5 parts (episodes+exercises) in this course:

- Episode 1: Down the Rabbit Hole

The flatmates figure out how virtual addresses and caches work, and they start realizing which timing differences might be hidden in there.

- Episode 2: Gone with the Flush

The flatmates discover the Flush+Flush and Evict+Reload attacks and learn a lot about how cache replacement works.

- Episode 3: Optimus Prime+Probe

The flatmates discover the Prime+Probe attack. They realize that it works in cases where Flush+Reload does not work and believe it is something completely new.

- Episode 4: Jonas and the Template of Doom

The flatmates realize that they can scan binaries for cache activity and automatically build cache side-channel attacks with that, forming the concept of Cache Template Attacks. In the end, upon Jonas' suggestion, they retrieve the Template of Doom; but they also attack AES for instance.

- Episode 5: Drama with Manuel

Manuel hurt his leg and cannot move. The timing differences he introduces in the flat activity inspire the discovery of DRAM Addressing (DRAMA) side channels.