{"id":"https://openalex.org/W4416749786","doi":"https://doi.org/10.1109/lca.2025.3638260","title":"Another Mirage of Breaking MIRAGE: Debunking Occupancy-Based Side-Channel Attacks on Fully Associative Randomized Caches","display_name":"Another Mirage of Breaking MIRAGE: Debunking Occupancy-Based Side-Channel Attacks on Fully Associative Randomized Caches","publication_year":2025,"publication_date":"2025-11-27","ids":{"openalex":"https://openalex.org/W4416749786","doi":"https://doi.org/10.1109/lca.2025.3638260"},"language":null,"primary_location":{"id":"doi:10.1109/lca.2025.3638260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lca.2025.3638260","pdf_url":null,"source":{"id":"https://openalex.org/S17643076","display_name":"IEEE Computer Architecture Letters","issn_l":"1556-6056","issn":["1556-6056","1556-6064","2473-2575"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computer Architecture Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030764040","display_name":"Caroline G. L. Cao","orcid":"https://orcid.org/0000-0003-1982-6489"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Chris Cao","raw_affiliation_strings":["University of Toronto, Toronto, ON, Canada","University of Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]},{"raw_affiliation_string":"University of Toronto, Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071514906","display_name":"Gururaj Saileshwar","orcid":"https://orcid.org/0000-0003-3542-2548"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gururaj Saileshwar","raw_affiliation_strings":["University of Toronto, Toronto, ON, Canada","University of Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]},{"raw_affiliation_string":"University of Toronto, Canada","institution_ids":["https://openalex.org/I185261750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030764040"],"corresponding_institution_ids":["https://openalex.org/I185261750"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2055961,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":"25","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9412999749183655,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9412999749183655,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.04580000042915344,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6244000196456909},{"id":"https://openalex.org/keywords/randomized-algorithm","display_name":"Randomized algorithm","score":0.4546999931335449},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.39309999346733093},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.36320000886917114},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.3160000145435333},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.30480000376701355}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8119999766349792},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6244000196456909},{"id":"https://openalex.org/C128669082","wikidata":"https://www.wikidata.org/wiki/Q583461","display_name":"Randomized algorithm","level":2,"score":0.4546999931335449},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.39309999346733093},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.38179999589920044},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.36320000886917114},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.3160000145435333},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.30480000376701355},{"id":"https://openalex.org/C155108698","wikidata":"https://www.wikidata.org/wiki/Q1231081","display_name":"Randomized experiment","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2897999882698059},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.2567000091075897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lca.2025.3638260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lca.2025.3638260","pdf_url":null,"source":{"id":"https://openalex.org/S17643076","display_name":"IEEE Computer Architecture Letters","issn_l":"1556-6056","issn":["1556-6056","1556-6064","2473-2575"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computer Architecture Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W4360831981","https://openalex.org/W4383221399","https://openalex.org/W4385152117"],"related_works":[],"abstract_inverted_index":{"A":[0],"recent":[1],"work":[2],"presented":[3],"at":[4],"USENIX":[5],"Security":[6],"2025,":[7],"<italic":[8],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[9],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Systematic":[10],"Evaluation":[11],"of":[12,50,62,109,117,136],"Randomized":[13],"Cache":[14,17],"Designs":[15],"against":[16],"Occupancy":[18],"(RCO)</i>,":[19],"claims":[20,40],"that":[21,43,58,132,168,179],"cache-occupancy-based":[22],"side-channel":[23],"attacks":[24],"can":[25],"recover":[26],"AES":[27,96,101,152,187],"keys":[28,188],"from":[29,46,114],"the":[30,59,68,90,106,141,161,169],"MIRAGE":[31,183],"randomized":[32,51,63,119,138,145],"cache.":[33],"In":[34],"this":[35],"paper,":[36],"we":[37,56],"examine":[38],"these":[39,80],"and":[41,155,160,178],"find":[42,57],"they":[44],"arise":[45],"a":[47,85],"flawed":[48,176],"modeling":[49,83,116,135,177],"caches":[52,64],"in":[53,79,146],"RCO.":[54],"Critically,":[55],"security":[60],"properties":[61],"strongly":[65],"depend":[66],"on":[67],"seeding":[69],"methodology":[70],"used":[71,78],"to":[72,88,103,158,163,175],"initialize":[73,89],"random":[74],"number":[75],"generators":[76],"(RNG)":[77],"caches.":[81],"RCO's":[82],"uses":[84],"constant":[86],"seed":[87,143],"cache":[91,110],"RNGs":[92],"for":[93,126],"each":[94,127,147],"simulated":[95,100],"encryption,":[97],"causing":[98],"every":[99],"encryption":[102],"artificially":[104],"evict":[105],"same":[107],"sequence":[108],"lines.":[111],"This":[112],"departs":[113],"accurate":[115,134],"such":[118,137],"caches,":[120,139],"where":[121,140],"eviction":[122],"sequences":[123],"vary":[124],"randomly":[125],"program":[128],"execution.":[129],"We":[130],"observe":[131],"an":[133],"RNG":[142],"is":[144],"simulation,":[148],"causes":[149],"correlations":[150],"between":[151],"T-table":[153],"accesses":[154],"attacker":[156],"observations":[157],"disappear,":[159],"attack":[162],"fail.":[164],"These":[165],"findings":[166],"show":[167],"previously":[170],"claimed":[171],"leakages":[172],"are":[173],"due":[174],"with":[180],"correct":[181],"modeling,":[182],"does":[184],"not":[185],"leak":[186],"via":[189],"occupancy":[190],"based":[191],"side-channels.":[192]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-28T00:00:00"}
