five

DataSet

收藏
DataCite Commons2025-04-01 更新2024-07-29 收录
下载链接:
https://figshare.com/articles/dataset/DataSet/20528937/1
下载链接
链接失效反馈
官方服务:
资源简介:
<strong>A Dataset of Cache Side-Channel Attacks</strong> <strong>About</strong> Cache side-channel attacks, capable of deducing secret by analyzing timing differences in the shared cache behavior of modern processors, pose a serious security threat. Flush+Reload and Prime+Probe are two widely-used cache side-channel attacks. On the one hand, they can leverage the Last Level Cache (LLC) to break the logical isolation between the attacker and victim, thus can launch cross-core, cross-VM attacks. On the other hand, they can be combined with the new micro-architecture attacks, such as Spectre , leading to more powerful and effective attack variants. This repository contains four types of cache side-channel attack techniques on the Intel x86-64 architecture, they are as follows: Flush+Reload Prime+Probe Flush+Reload with Spectre Prime+Probe with Spectre <strong>File Tree</strong> The file tree of our dataset can be shown as follows. Each folder contains a type of cache side channel attack. <pre><code>DATASET<br> ├── Flush+Reload<br> │ ├── fr*.c<br> │ └── fr*.c.out<br> ├── Flush+Reload with Spectre<br> │ ├── fr_spectre*.c<br> │ └── fr_spectre*.c.out<br> ├── Prime+Probe<br> │ ├── pp*.c<br> │ └── pp*.c.out<br> └── Prime+Probe with Spectre<br> ├── pp_spectre*.c<br> └── pp_spectre*.c.out<br> <br> </code></pre> There exists 400 samples for each type of attack. For every attack sample, the mutated source code file and the compiled binary are attached. Note that we compile the source code on Ubuntu 16.04 with GCC/G++ 5.4.0. <strong>Flush+Reload</strong> Our samples of Flush+Reload are collected from three Github Repos respectively: fr1*.c<br> To compile fr1*.c, use:<br> <code>$ g++ -o fr1*.out fr1*.c -lcrypto</code><br> <code>$ cp /usr/lib/x86_64-linux-gnu/libcrypto.so ./libcrypto.so</code> fr2*.c<br> To obtain the fr2*.out, use:<br> <code>$ g++ -o fr2*.out fr2*.c -lcrypto</code><br> <code>$ cp /usr/lib/x86_64-linux-gnu/libcrypto.so ./libcrypto.so</code> fr3*.c<br> <code>$ cp fr3*.c /Path/to/Mastik/src/</code><br> <code>$ cd /Path/to/Mastik/demo/</code><br> <code>$ gcc FR-1-file-access.c ../src/fr3*.c ../src/timestats.c ../src/vlist.c ../src/util.c -o fr3*.out</code> <strong>Prime+Probe</strong> Our samples of Prime+Probe are collected from two Github Repos respectively: pp1*.c<br> To compile pp1*.c, use:<br> <code>$ g++ -o pp1*.out pp1*.c -lcrypto</code><br> <code>$ cp /usr/lib/x86_64-linux-gnu/libcrypto.so ./libcrypto.so</code> pp2*.c<br> To obtain the pp2*.out, use:<br> <code>$ touch transmitted-secret.txt</code><br> <code>$ echo "test for pp" &gt; transmitted-secret.txt</code><br> <code>$ gcc -o pp2*.out pp2*.c</code> <strong>Flush+Reload with Spectre</strong> Our samples of Flush+Reload with Spectre are collected from the original paper and two Github Repos respectively: fr_spectre1*.c<br> To compile ff_spectre1*.c, use:<br> <code>$ gcc fr_spectre1*.c -o ff_spectre1*.out -std=gnu99</code> fr_spectre2*.c<br> To obtain the ff_spectre2*.out, use:<br> <code>$ gcc fr_spectre2*.c -o ff_spectre2*.out -std=gnu99</code> fr_spectre3*.c<br> Also, we compile ff_spectre3*.c with following command:<br> <code>$ gcc fr_spectre3*.c -o ff_spectre3*.out -std=gnu99</code> <strong>Prime+Probe with Spectre</strong> Our samples of Prime+Probe with Spectre are collected from the original paper: pp_spectre*.c<br> To compile pp_spectre*.c, use:<br> <code>$ gcc pp_spectre*.c -o pp_spectre*.out -pthread -std=gnu99</code>
提供机构:
figshare
创建时间:
2022-08-22
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作