2017
DOI: 10.1145/3023872
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Timing Channels and Countermeasures

Abstract: A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an agent. Examples of this agent include the inter-packet delays of a packet stream, reordering packets in a packet stream or resource access time of a cryptographic module. The advances in information theory and the availability of high performance computing systems interconnected by high speed networks, have spurred interest and development of various types of timing channels. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(34 citation statements)
references
References 160 publications
(243 reference statements)
0
34
0
Order By: Relevance
“…Survey Platform Topic 2011 Enck [30] Smartphone Malware/app analysis and protection mechanisms 2013 La Polla et al [31] Smartphone Threats and vulnerabilities, focusing on the period 2004-2011 2014 Suarez-Tangil et al [32] Smartphone Threats and vulnerabilities, focusing on the period 2010-2013 2015 Faruki et al [33] Smartphone Threats and vulnerabilities, focusing on the period 2010-2014 2015 Rashidi and Fung [34] Smartphone Analysis techniques to cope with malware 2016 Sadeghi et al [35] Smartphone Tools and techniques to identify malware 2017 Tam et al [36] Smartphone Analysis techniques to identify malware 2014 Tunstall [37] Smart card Side-channel attacks on cryptographic algorithms 2007 Zander et al [38] PC Covert channels via computer network protocols 2017 Biswas et al [39] PC Timing channels, focusing on microarchitectural attacks 2016 Ge et al [7] Cloud Microarchitectural attacks 2016 Szefer [40] Cloud Microarchitectural attacks 2017 Ullrich et al [41] Cloud Network-based side channels (and communication channels) 2017 Betz et al [42] Cloud Communication channels 2016 Xu et al [43] Smartphone Attacks & defense measures 2016 Hussain et al [44] Smartphone Sensor-based keylogging attacks 2016 Nahapetian [45] Smartphone Sensor-based keylogging attacks…”
Section: Yearmentioning
confidence: 99%
“…Survey Platform Topic 2011 Enck [30] Smartphone Malware/app analysis and protection mechanisms 2013 La Polla et al [31] Smartphone Threats and vulnerabilities, focusing on the period 2004-2011 2014 Suarez-Tangil et al [32] Smartphone Threats and vulnerabilities, focusing on the period 2010-2013 2015 Faruki et al [33] Smartphone Threats and vulnerabilities, focusing on the period 2010-2014 2015 Rashidi and Fung [34] Smartphone Analysis techniques to cope with malware 2016 Sadeghi et al [35] Smartphone Tools and techniques to identify malware 2017 Tam et al [36] Smartphone Analysis techniques to identify malware 2014 Tunstall [37] Smart card Side-channel attacks on cryptographic algorithms 2007 Zander et al [38] PC Covert channels via computer network protocols 2017 Biswas et al [39] PC Timing channels, focusing on microarchitectural attacks 2016 Ge et al [7] Cloud Microarchitectural attacks 2016 Szefer [40] Cloud Microarchitectural attacks 2017 Ullrich et al [41] Cloud Network-based side channels (and communication channels) 2017 Betz et al [42] Cloud Communication channels 2016 Xu et al [43] Smartphone Attacks & defense measures 2016 Hussain et al [44] Smartphone Sensor-based keylogging attacks 2016 Nahapetian [45] Smartphone Sensor-based keylogging attacks…”
Section: Yearmentioning
confidence: 99%
“…Next, we introduce some typical detection methods for NCTCs. These methods can be broadly categorized as belonging to one of the three classes, namely, regularity tests, shape tests, and entropy tests. The current problem is that some methods can only detect certain types of NCTCs.…”
Section: Related Workmentioning
confidence: 99%
“…Detailed surveys on microarchitectural timing attacks in general [8], [2] and cache timing attacks in particular [11] can be found in the literature. [5] includes a systematic evaluation of transient execution attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, a malicious process which is being executed in one core of the system can extract information from a victim executed in a different core. The most commonly used resource as side-channel to extract information is the shared cache [2].…”
Section: Introductionmentioning
confidence: 99%