Course start: 3. studenoga 2025

Cache Side-Channel Attacks and Mitigations

Graz University of Technology

Daniel Gruß

Scientific classification:

  • Računalne znanosti (102)
  • Informacijsko inženjerstvo (202)

Course start: 3. studenoga 2025

Cache Side-Channel Attacks and Mitigations

Graz University of Technology

Daniel Gruß

  • Scope: 5 units
  • Effort: 2 hours/week
  • Current participants: 9
  • Licence: CC BY 4.0
  • Course start: 3. studenoga 2025
  • Course end: -
  • Current status: Upcoming course
  • Available languages:
    • English ‎(en)‎
All courses on iMooX are and remain free for everyone! Read more

Course details

Course content

Side channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.

Learning goals

After completing this course, you will:

  • be able to spot side-channel leakage in simple programmes
  • be able to use software-based side channels to extract secret information
  • be able to connect these security risks with methods to mitigate and close side channels in software

Prerequisites

No formal prerequisites, but it is expected that you already have started to build up your side-channel security mindset, for instance via the corresponding iMooX course.

Course schedule

There are 5 parts (episodes+exercises) in this course:

- Episode 1: Down the Rabbit Hole

The flatmates figure out how virtual addresses and caches work, and they start realizing which timing differences might be hidden in there.

- Episode 2: Gone with the Flush

The flatmates discover the Flush+Flush and Evict+Reload attacks and learn a lot about how cache replacement works.

- Episode 3: Optimus Prime+Probe

The flatmates discover the Prime+Probe attack. They realize that it works in cases where Flush+Reload does not work and believe it is something completely new.

- Episode 4: Jonas and the Template of Doom

The flatmates realize that they can scan binaries for cache activity and automatically build cache side-channel attacks with that, forming the concept of Cache Template Attacks. In the end, upon Jonas' suggestion, they retrieve the Template of Doom; but they also attack AES for instance.

- Episode 5: Drama with Manuel

Manuel hurt his leg and cannot move. The timing differences he introduces in the flat activity inspire the discovery of DRAM Addressing (DRAMA) side channels.