隐藏物
计算机科学
利用
定时攻击
嵌入式系统
架空(工程)
缓存算法
缓存污染
缓存失效
频道(广播)
计算机安全
旁道攻击
CPU缓存
钥匙(锁)
多核处理器
任务(项目管理)
过程(计算)
密码学
计算机网络
操作系统
工程类
系统工程
作者
Jaspinder Kaur,Shirshendu Das
标识
DOI:10.1007/s41635-021-00115-3
摘要
Cache timing channel attacks has attained a lot of attention in the last decade. These attacks exploits the timing channel created by the significant time gap between cache and main memory accesses. It has been successfully implemented to leak the secret key of various cryptography algorithms. The latest advancements in cache attacks also exploit other micro-architectural components such as hardware prefetchers, branch predictor, and replacement engine, in addition to the cache memory. Detection of these attacks is a difficult task as the attacker process running in the processor must be detected before significant portion of the attack is complete. The major challenge for mitigation and defense mechanisms against these attacks is maintaining the system performance while disabling or avoiding these attacks. The overhead caused by detection, mitigation and defense mechanism must not be significant to system’s performance. This paper discusses the research carried out in three aspects of cache security: cache timing channel attacks, detection techniques of these attacks, and defense mechanisms in details.
科研通智能强力驱动
Strongly Powered by AbleSci AI