{"id":"https://openalex.org/W6966888895","doi":"https://doi.org/10.48550/arxiv.2508.10431","title":"Yet Another Mirage of Breaking MIRAGE: Debunking Occupancy-based Side-Channel Attacks on Fully Associative Randomized Caches","display_name":"Yet Another Mirage of Breaking MIRAGE: Debunking Occupancy-based Side-Channel Attacks on Fully Associative Randomized Caches","publication_year":2025,"publication_date":"2025-08-14","ids":{"openalex":"https://openalex.org/W6966888895","doi":"https://doi.org/10.48550/arxiv.2508.10431"},"language":"en","primary_location":{"id":"doi:10.48550/arxiv.2508.10431","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.10431","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2508.10431","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Cao, Chris","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cao, Chris","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Saileshwar, Gururaj","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Saileshwar, Gururaj","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.013399999588727951,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.5630999803543091},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4884999990463257},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4731000065803528},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4505999982357025},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.44839999079704285},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.4307999908924103},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4146000146865845},{"id":"https://openalex.org/keywords/randomized-algorithm","display_name":"Randomized algorithm","score":0.3822000026702881}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7552000284194946},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.5630999803543091},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5058000087738037},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4884999990463257},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4731000065803528},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4505999982357025},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.44839999079704285},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.4307999908924103},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4146000146865845},{"id":"https://openalex.org/C128669082","wikidata":"https://www.wikidata.org/wiki/Q583461","display_name":"Randomized algorithm","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.3447999954223633},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3377000093460083},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.3248000144958496},{"id":"https://openalex.org/C186515451","wikidata":"https://www.wikidata.org/wiki/Q228191","display_name":"Random sequence","level":3,"score":0.3203999996185303},{"id":"https://openalex.org/C159423971","wikidata":"https://www.wikidata.org/wiki/Q177251","display_name":"Associative property","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.2957000136375427},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.28859999775886536},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2874999940395355},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2818000018596649},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.27810001373291016},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26829999685287476},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26159998774528503},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2612000107765198}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2508.10431","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.10431","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2508.10431","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.10431","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.5347042679786682,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"work":[1],"presented":[2],"at":[3],"USENIX":[4],"Security":[5],"2025":[6],"(SEC'25)":[7],"claims":[8,27],"that":[9,30,88,135],"occupancy-based":[10],"attacks":[11],"can":[12],"recover":[13],"AES":[14,67,121],"keys":[15],"from":[16,33],"the":[17,38,43,55,73,109,118,129,136],"MIRAGE":[18,48],"randomized":[19],"cache.":[20],"In":[21],"this":[22],"paper,":[23],"we":[24,106],"examine":[25],"these":[26],"and":[28,124,128,145],"find":[29],"they":[31,69],"arise":[32],"a":[34,50,83,93],"modeling":[35],"flaw":[36],"in":[37,63,150],"SEC'25":[39,44],"paper.":[40],"Most":[41],"critically,":[42],"paper's":[45],"simulation":[46],"of":[47,77,92,96,142],"uses":[49],"constant":[51],"seed":[52,111],"to":[53,71],"initialize":[54],"random":[56],"number":[57],"generator":[58],"used":[59],"for":[60,112],"global":[61],"evictions":[62],"MIRAGE,":[64,97],"causing":[65],"every":[66],"encryption":[68],"trace":[70],"evict":[72],"same":[74],"deterministic":[75],"sequence":[76],"cache":[78],"lines.":[79],"This":[80],"artificially":[81],"creates":[82],"highly":[84],"repeatable":[85],"timing":[86],"pattern":[87],"is":[89,139],"not":[90,146],"representative":[91],"realistic":[94,116],"implementation":[95],"where":[98],"eviction":[99,110],"sequences":[100],"vary":[101],"randomly":[102],"between":[103,120],"encryptions.":[104],"When":[105],"instead":[107],"randomize":[108],"each":[113],"run,":[114],"reflecting":[115],"operation,":[117],"correlation":[119],"T-table":[122],"accesses":[123],"attacker":[125],"runtimes":[126],"disappears,":[127],"attack":[130],"fails.":[131],"These":[132],"findings":[133],"show":[134],"reported":[137],"leakage":[138],"an":[140,147],"artifact":[141],"incorrect":[143],"modeling,":[144],"actual":[148],"vulnerability":[149],"MIRAGE.":[151]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
