Trustworthy Systems

Mapping the Intel last-level cache


Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee and Gernot Heiser

University of Adelaide



Princeton University



Modern Intel processors use an undisclosed hash function to map memory lines into last-level cache slices. In this work we develop a technique for reverse-engineering the hash function. We apply the technique to a 6-core Intel processor and demonstrate that knowledge of this hash function can facilitate cache-based side channel attacks, reducing the amount of work required for profiling the cache by three orders of magnitude. We also show how using the hash function we can double the number of colours used for page-colouring techniques.

BibTeX Entry

    author           = {Yarom, Yuval and Ge, Qian and Liu, Fangfei and Lee, Ruby B. and Heiser, Gernot},
    booktitle        = {The Cryptology ePrint Archive},
    howpublished     = {},
    month            = sep,
    paperurl         = {},
    title            = {Mapping the {Intel} Last-Level Cache},
    year             = {2015}