Submitted:
30 May 2025
Posted:
02 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Background
2.1. Software Prefetcher
2.2. Huge Pages
2.3. Cache Architecture and Coherence Protocols: MESI
2.4. Contention-Based and State-Based Cross-Core Cache Attacks
2.5. Cache Coherence Covert Channels
3. Design of Multi-Line Prefetch Covert Channel with Huge Pages
3.1. Overview of the Multi-Line Prefetch Attack Implementation
3.2. Baseline Performance Comparison with Prefetching and Huge Pages
| Algorithm 1 Timing Measurement per Cache Line |
![]() |
- Huge Pages Only: Enabling huge pages alone reduces the average access latency by approximately 22% compared to the baseline. This is primarily due to the reduced TLB pressure and improved memory translation efficiency provided by 2MB page mappings.
- Prefetching Only: Applying software prefetching without huge pages results in a 13% latency reduction. The prefetch instruction (__builtin_prefetch()) helps bring the cache lines closer to the processor ahead of access, thereby reducing stalls.
- Combined Optimization: The combination of huge pages and prefetching yields the lowest average latency (1.88 cycles). This configuration effectively leverages both reduced TLB pressure from huge pages and improved cache readiness from prefetching, making it the most efficient strategy for minimizing access latency in our setup.
3.3. Setup and Configuration
3.4. Multi-Line Encoding for Flexible Communication
3.5. Fine-Grained Decoding Mechanism
3.6. Workflow for Multi-Line Encoding and Decoding
| Algorithm 2 Covert Channel Communication via Prefetch-Based Encoding |
![]() |
3.7. Synchronization and Timing Optimizations
4. Results
4.1. Throughput and Accuracy
- Effective Bits/Round = Bits per iteration × Accuracy
- Effective Bandwidth (KB/s) = Raw Bandwidth × Accuracy
5. Discussion
6. Conclusion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Guo, Y.; Zigerelli, A.; Zhang, Y.; Yang, J. Adversarial prefetch: New cross-core cache side channel attacks. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022, pp. 1458–1473.
- Trippel, C.; Lustig, D.; Martonosi, M. MeltdownPrime and SpectrePrime: Automatically-synthesized attacks exploiting invalidation-based coherence protocols. arXiv preprint arXiv:1802.03802 2018.
- Fogh, A. “Row hammer, java script and MESI 2016.
- Götzfried, J.; Eckert, M.; Schinzel, S.; Müller, T. Cache Attacks on Intel SGX. In Proceedings of the Proceedings of the 10th European Workshop on Systems Security, New York, NY, USA, 2017; EuroSec’17. [CrossRef]
- Han, Y.; Kim, J. A Novel Covert Channel Attack Using Memory Encryption Engine Cache. In Proceedings of the Proceedings of the 56th Annual Design Automation Conference 2019, New York, NY, USA, 2019; DAC ’19. [CrossRef]
- Lantz, D. Detection of side-channel attacks targeting Intel SGX. Master’s thesis, Linköping University, 2021.
- Miketic, I.; Dhananjay, K.; Salman, E. Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems. Sensors 2023, 23. [CrossRef]
- Cho, H.; Zhang, P.; Kim, D.; Park, J.; Lee, C.H.; Zhao, Z.; Doupé, A.; Ahn, G.J. Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. In Proceedings of the Proceedings of the 34th Annual Computer Security Applications Conference, New York, NY, USA, 2018; ACSAC ’18, p. 441–452. [CrossRef]
- Li, X.; Tyagi, A. Cross-World Covert Channel on ARM Trustzone through PMU. Sensors 2022, 22. [CrossRef]
- Mittal, S. A survey of recent prefetching techniques for processor caches. ACM Computing Surveys (CSUR) 2016, 49, 1–35.
- Zhang, Z. Lecture Notes on Cache Prefetching, 2005. Accessed: January 7, 2025.
- Oren, N. A Survey of prefetching techniques. Relatório Técnico Julho De 2000.
- Chen, Y.; Xue, H. Optimizing Memory Performance with Explicit Software Prefetching. ACM Digital Library 2016. Accessed: January 7, 2025.
- Ashwathnarayana, S. Understanding Huge Pages 2023. Accessed: January 7, 2025.
- Red Hat. Chapter 9. What huge pages do and how they are consumed by applications, n.d. Accessed: January 7, 2025.
- TechOverflow. Advantages and disadvantages of hugepages, 2017. Accessed: January 7, 2025.
- Luo, T.; Wang, X.; Hu, J.; Luo, Y.; Wang, Z. Improving TLB performance by increasing hugepage ratio. In Proceedings of the 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE, 2015, pp. 1139–1142.
- Easyperf. Performance Benefits of Using Huge Pages for Code, 2022. Accessed: January 7, 2025.
- Panwar, A.; Prasad, A.; Gopinath, K. Making huge pages actually useful. In Proceedings of the Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018, pp. 679–692.
- Fan, R. A Comprehensive Guide to Using Huge Pages in Oracle Databases, 2023. Accessed: January 7, 2025.
- Dutta, S.B.; Naghibijouybari, H.; Abu-Ghazaleh, N.; Marquez, A.; Barker, K. Leaky buddies: cross-component covert channels on integrated CPU-GPU systems. In Proceedings of the Proceedings of the 48th Annual International Symposium on Computer Architecture. IEEE Press, 2021, ISCA ’21, p. 972–984. [CrossRef]
- Cook, J.; Drean, J.; Behrens, J.; Yan, M. There’s always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attack. In Proceedings of the Proceedings of the 49th Annual International Symposium on Computer Architecture, New York, NY, USA, 2022; ISCA ’22, p. 204–217. [CrossRef]


| Config | Huge Pages | Prefetching | Avg Latency (cycles) |
|---|---|---|---|
| Baseline | OFF | OFF | 2.46 |
| Prefetch Only | OFF | ON | 2.13 |
| Huge Pages Only | ON | OFF | 1.91 |
| Huge Pages + Prefetch | ON | ON | 1.88 |
| Encoding Strategy | Page Size | Throughput (KB/s) | Accuracy (%) |
|---|---|---|---|
| Single-Line Encoding [1] | 4 KB | 822 | – |
| Multi-Line Read-Only | 4 KB | 4,623 | 80.55 |
| Multi-Line Read-Only | 2 MB | 4,940 | 81.23 |
| Multi-Line Write Access | 4 KB | 4,345 | 82.16 |
| Multi-Line Write Access | 2 MB | 4,828 | 83.34 |
| Scheme | Bits/Round | Accuracy (All Bits) | Bandwidth (KB/s) |
|---|---|---|---|
| 10 bits / 1024 lines | 10 | 64.31% | 2,654 |
| 9 + 9 bits / 512 lines each | 9 | 58.20% | 4,687 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

