2016
DOI: 10.1007/s13389-016-0141-6
|View full text |Cite
|
Sign up to set email alerts
|

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
284
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 302 publications
(285 citation statements)
references
References 113 publications
1
284
0
Order By: Relevance
“…All SCAs rely on some side channel information leakage, so SCA countermeasures aim at either hiding this leakage or at minimizing this leakage so that it contains very small or no useful information to mount an attack (making the leakage trace, data independent) [41]. The most widely used countermeasure, primarily applicable on microarchitecture attacks, is making the security operation time delay constant or random, regardless of the microarchitecture elements that are used or the implemented code it is executed [42]. However, developing constant-time execution code is not always easy since optimizations introduced by the compiler must be bypassed.…”
Section: Side Channel Analysis Attack Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…All SCAs rely on some side channel information leakage, so SCA countermeasures aim at either hiding this leakage or at minimizing this leakage so that it contains very small or no useful information to mount an attack (making the leakage trace, data independent) [41]. The most widely used countermeasure, primarily applicable on microarchitecture attacks, is making the security operation time delay constant or random, regardless of the microarchitecture elements that are used or the implemented code it is executed [42]. However, developing constant-time execution code is not always easy since optimizations introduced by the compiler must be bypassed.…”
Section: Side Channel Analysis Attack Countermeasuresmentioning
confidence: 99%
“…Among the existing solutions (fitted in the above-mentioned categories) there exist techniques to eliminate timing side channels by introducing virtual time and black-box mitigation techniques [42]. Also, time partitioning can be used through regular Cache Flushing, Lattice Scheduling, Memory Controller Partitioning, structuring Execution Leases and performing Kernel address space isolation.…”
Section: Side Channel Analysis Attack Countermeasuresmentioning
confidence: 99%
“…Detailed surveys on microarchitectural timing attacks in general [8], [2] and cache timing attacks in particular [11] can be found in the literature. [5] includes a systematic evaluation of transient execution attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This isolation property is supposed to be one of the security properties of cloud computing systems. However, within the last decade, academicians and practitioners have discovered that this isolation is not impenetrable [1][2][3][4]. One well-known technique to break this isolation feature is a cache-based side channel attack (CSCa).…”
Section: Introductionmentioning
confidence: 99%