{"title":"Security in Cache Memory: Review","authors":"Nishtha, Meenu","doi":"10.1109/ICCMC.2018.8487674","DOIUrl":null,"url":null,"abstract":"Security of cache memory is of concern in applications related to memory software. The purpose of our paper is to examine number of attacks relating to cache memory and suggest precautions towards such threats and guarantee memory cache security. Analysis: Data stored in cached memory could be easily retrieved. This has concern of being accessed by the unauthorized users. Output shows that side channel, duration and ability based attacks are major challenge in cached security. Findings: discussing of about arrangements included in the secured cryptographic based calculation so outlined, secure mindful store low power and mapping reserve configuration by utilizing procedures, for example, XOR operations settled, code convertors, broadened Hamming codes and multi-bit bunched ECC. Application or Enhancement: enhancing and confirming security of cache memory will bring about various applications including brilliant applications with mystery of information with extraordinary significance.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"71 1","pages":"659-662"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487674","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Security of cache memory is of concern in applications related to memory software. The purpose of our paper is to examine number of attacks relating to cache memory and suggest precautions towards such threats and guarantee memory cache security. Analysis: Data stored in cached memory could be easily retrieved. This has concern of being accessed by the unauthorized users. Output shows that side channel, duration and ability based attacks are major challenge in cached security. Findings: discussing of about arrangements included in the secured cryptographic based calculation so outlined, secure mindful store low power and mapping reserve configuration by utilizing procedures, for example, XOR operations settled, code convertors, broadened Hamming codes and multi-bit bunched ECC. Application or Enhancement: enhancing and confirming security of cache memory will bring about various applications including brilliant applications with mystery of information with extraordinary significance.