SHD-CacheAttackLab/report.md

1.5 KiB

1-1

Fill in the blanks in the following table using the information you gathered about the cache configuration of the lab machine.

Cache Cache Line Size Total Size Associativity Number of Sets Raw Latency
L1-D 64
L2
L3

1-3

After completing your code, generate the histogram pdf file and include it in the lab report.

1-4

Based on the generated histogram, report two thresholds, one to distinguish between L2 and L3 latency and the other to distinguish between L3 and DRAM latency.

L2-L3 threshold:

L3-DRAM threshold:

2-2

If the victim want to read the kth byte of a file, where k is a secret, how can he/she avoid leaking the secret to the attacker?

3-1

Given a 64-bit virtual address, fill in the table below.

Page Size 4KB 2MB
Page Offset Bits
Page Number Bits
L2 Set Index Bits
L2 Set Index Bits Fully Under Control