• Title/Summary/Keyword: Cache System

Search Result 457, Processing Time 0.049 seconds

Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA (블록 암호 ARIA에 대한 Flush+Reload 캐시 부채널 공격)

  • Bae, Daehyeon;Hwang, Jongbae;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1207-1216
    • /
    • 2020
  • Since the server system in the cloud environments can simultaneously operate multiple OS and commonly share the memory space between users, an adversary can recover some secret information using cache side-channel attacks. In this paper, the Flush+Reload attack, a kind of cache side-channel attacks, is applied to the optimized precomputation table implementation of Korea block cipher standard ARIA. As an experimental result of attack on ARIA-128 implemented in Ubuntu environment, we show that the adversary can extract the 16 bytes last round key through Flush+Reload attack. Furthermore, the master key of ARIA can be revealed from last and first round key used in an encryption processing.

Implementation of T-Cache engine based on Primary key for enhancing System Performance (시스템 성능 향상을 위한 Primary key 기반 T-Cache 설계 및 구현)

  • Kang, Hyung-Man;Lee, Un-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1195-1198
    • /
    • 2011
  • 인터넷 및 스마트폰 등 모바일 시장의 급성장으로 다양한 채널이 발달하여 금융거래가 급속하게 증가함으로써 시스템 자원이 부족하고 또한, 급변하는 금융시장에서 경쟁력을 잃지 않기 위하여 국내의 금융권 시스템들은 차세대를 진행하면서 경쟁적으로 프레임웍을 도입하여 프로젝트를 진행하였거나 또는 진행하고 있다. 프레임웍은 요청한 거래를 검증하고, 처리하여 결과를 반환할 수 있도록 여러 가지 편의성을 제공하지만, 동일 테이블 데이터를 매 거래마다 데이터베이스를 조회함으로써 데이터베이스 서버의 부하가 증가하고 거래 처리가 지연되는 문제점이 있다. 본 논문에서는 프레임웍 기반의 매 거래마다 동일 데이터를 데이터베이스로부터 질의함으로써 발생하는 거래처리 지연을 극복하고 보다 빠른 응답 처리를 위하여 1) 대부분 조회를 처리하는 테이블에 대해서 테이블 단위로 Primary key을 이용하여 공유메모리에 저장하고, 많은 응용프로그램 간에 공유하는 방식으로 거래를 처리함으로써 디스크 I/O나 네트워크 I/O, DBMS 자체 프로세싱을 크게 감소하여 전제적으로 시스템의 성능을 향상시키며 2) 공유메모리에 저장하고 있는 데이터와 데이터베이스 테이블에 저장된 데이터간의 동기화를 지원하는 Primary key 기반 T-Cache(Table Cache) 알고리즘을 제안한다.

i$^2$SCSI: Intelligent iSCSI Shared Disk Providing Cache Consistency in Storage Area Network (i$^2$SCSI: Storage Area Network에서 캐시 일관성을 제공하는 지능적인 iSCSI 공유 디스크)

  • 이주평;황주영;임승호;박규호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1327-1330
    • /
    • 2003
  • The internet SCSI(iSCSI) disk has been studied as a storage system which can be directly connected to TCP/IP network. We designed and implemented a shared disk following the iSCSI protocol and providing cache consistency. It is named as intelligent iSCSI(i$^2$SCSI) disk. The i$^2$SCSI disk provides cache consistency of all blocks that belong to the disk using a conventional lease method and it uses 'contiguous blocks-level locking' The prototype of the i$^2$SCSI disk emulator and its client is designed and implemented in Linux 2.4.

  • PDF

Analysis of Optimistic Cache Protocols based on broadcasting for Mobile Computing Environments (이동 컴퓨팅 환경에서 방송기반의 낙관적 캐쉬 프로토콜들에 대한 분석)

  • Cho, Sung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.177-185
    • /
    • 2005
  • Caching in mobile computing environments Is an important technique that will reduce the effects such as limitation of bandwidth, restriction of resources and frequent disconnection. To reduce limitation and disconnection problems in mobile computing, a new form of caching system have been proposed based on a broadcast approach. This paper proposes a broadcast based cache protocol and examines the behaviors of the proposed scheme and well known schemes such as multiversion based scheme and Certification Reports. By a detailed simulation, we show some characteristics of different approaches to detect and resolve conflicts. We also show proposed scheme out performs other schemes with a low space and operation overhead.

  • PDF

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction

  • Im, Hyeonseung;Kim, Dohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2904-2918
    • /
    • 2020
  • With a huge demand for replicated content on the Internet, a new networking paradigm called information-centric networking (ICN) has been introduced for efficient content dissemination. In ICN, named content is distributed over the network cache and it is accessed by name instead of a location identifier. These aspects allow users to retrieve content from any of the nodes having replicas, and consequently 1) network resources are more efficiently utilized by avoiding redundant transmission and 2) more scalable services are provided by distributing server loads. However, in-network caching in ICN brings about a new type of security issues, called content poisoning attacks, where fabricated content is located in the network cache and interferes with the normal behavior of the system. In this paper, we look into the problems of content poisoning in ICN and discuss security architectures against them. In particular, we reconsider the state-of-the-art schemes from the perspective of feasibility, and propose a practical security architecture.

Analytical Models of Instruction Fetch on Superscalar Processors

  • Kim, Sun-Mo;Jung, Jin-Ha;Park, Sang-Bang
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.619-622
    • /
    • 2000
  • This research presents an analytical model to predict the instruction fetch rate on superscalar Processors. The proposed model is also able to analyze the performance relationship between cache miss and branch prediction miss. The proposed model takes into account various kind of architectural parameters such as branch instruction probability, cache miss rate, branch prediction miss rate, and etc.. To prove the correctness of the proposed model, we performed extensive simulations and compared the results with those of the analytical models. Simulation results showed that the pro-posed model can estimate the instruction fetch rate accurately within 10% error in most cases. The model is also able to show the effects of the cache miss and branch prediction miss on the performance of instruction fetch rate, which can provide an valuable information in designing a balanced system.

  • PDF

Contactless Smart Card as a Cache for Geocaching

  • Burda, Karel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.205-210
    • /
    • 2021
  • In this paper, the possibility of using a contactless smart card as a cache for geocaching is analyzed. Geocaching is an outdoor game in which players search for hidden boxes, or caches based on geographical coordinates. The problems with this game are the possibility of players cheating and the need to maintain the caches. And then there is the problem of the ignorant public accidentally discovering a cache and considering it an explosive device. This paper proposes a concept for a possible solution to the above problems by replacing the boxes with conventional contactless smart cards. Also, this concept makes geocaching more attractive by using various games. This paper proposes a system architecture as well as the cryptographic protocol required for secure communication between the player's smartphone and the card.

An efficient caching scheme at replacing a dirty block for softwre RAID filte systems (소프트웨어 RAID 파일 시스템에서 오손 블록 교체시에 효율적인 캐슁 기법)

  • 김종훈;노삼혁;원유헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.7
    • /
    • pp.1599-1606
    • /
    • 1997
  • The software RAID file system is defined as the system which distributes data redundantly across an aray of disks attached to each workstations connected on a high-speed network. This provides high throughput as well as higher availability. In this paper, we present an efficient caching scheme for the software RAID filte system. The performance of this schmem is compared to two other schemes previously proposed for convnetional file systems and adapted for the software RAID file system. As in hardware RAID systems, small-writes to be the performance bottleneck in softwre RAID filte systems. To tackle this problem, we logically divide the cache into two levels. By keeping old data and parity val7ues in the second-level cache we were able to eliminate much of the extra disk reads and writes necessary for write-back of dirty blocks. Using track driven simulations we show that the proposed scheme improves performance for both the average response time and the average system busy time.

  • PDF

Chacterization of Small Embedded Programs (소형 임베디드 프로그램의 실행 속도와 특성분석)

  • Chung, Sae-Am;Yi, Jong-Su;Kim, Jun-Seong
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.771-772
    • /
    • 2008
  • In this paper, we analyze the characterization of Mibench, an embedded system benchmark program, using simplescalar simulator. The experimental results show Mibench generally is formed by lots of integer and memory access instructions. Especially, IPC of rijndael decoding is effected by cache size largely, but IPC of CRC32 is few effected by cache size or branch predicting algorithm.

  • PDF

Application of Group Master Cache for the Integrated Environment of SAN and NAS (Group Master Cache를 활용한 SAN과 NAS의 통합 방안)

  • Lee, Won-Bok;Park, Jin-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.9-15
    • /
    • 2007
  • As the Internet grows and the mass multimedia data become popular, the storage system migrates from DAS, where the storage and the server are directly connected, to SAN and NAS. SAN connects the storages with a separate network, and NAS provides only file services, connects the storages with IP network. However, SAN and NAS can not fulfill the needs for companies if used separately, thus are asked to be integrated. In this research, we propose an efficient data sharing method which employees the concept of GMC, Croup Master Cache for the integrated environment of SAN and NAS. GMC is based on MCI, Metadata server and Cluster system Integration, but tries to solve the high expansion cost problem with MCI. We introduce the basic concept of GMC, compare the performance of GMC with that of MCI using computer simulation.

  • PDF