Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Author:

Su Chao12ORCID,Zeng Qingkai12ORCID

Affiliation:

1. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China

2. Department of Computer Science and Technology, Nanjing 210023, China

Abstract

Privacy protection is an essential part of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments. Side-channel attacks based on CPU cache utilize shared CPU caches within the same physical device to compromise the system’s privacy (encryption keys, program status, etc.). Information is leaked through channels that are not intended to transmit information, jeopardizing system security. These attacks have the characteristics of both high concealment and high risk. Despite the improvement in architecture, which makes it more difficult to launch system intrusion and privacy leakage through traditional methods, side-channel attacks ignore those defenses because of the shared hardware. Difficult to be detected, they are much more dangerous in modern computer systems. Although some researchers focus on the survey of side-channel attacks, their study is limited to cryptographic modules such as Elliptic Curve Cryptosystems. All the discussions are based on real-world applications (e.g., Curve25519), and there is no systematic analysis for the related attack and security model. Firstly, this paper compares different types of cache-based side-channel attacks. Based on the comparison, a security model is proposed. The model describes the attacks from four key aspects, namely, vulnerability, cache type, pattern, and range. Through reviewing the corresponding defense methods, it reveals from which perspective defense strategies are effective for side-channel attacks. Finally, the challenges and research trends of CPU cache-based side-channel attacks in both attacking and defending are explored. The systematic analysis of CPU cache-based side-channel attacks highlights the fact that these attacks are more dangerous than expected. We believe our survey would draw developers’ attention to side-channel attacks and help to reduce the attack surface in the future.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference65 articles.

1. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems;P. C. Kocher

2. Advances on access-driven cache attacks on AES;M. Neve

3. SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution

4. Wait a minute! A fast, cross-vm attack on AES;G. I. Apecechea

5. Cache attacks and countermeasures: the case of AES;D. A. Osvik

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. EBCache: A novel cache-based mechanism for mitigating the spectre attacks for RISC-V processor;China Communications;2024

2. A comprehensive survey on hardware-assisted malware analysis and primitive techniques;Computer Networks;2023-11

3. MirrorNet: A TEE-Friendly Framework for Secure On-Device DNN Inference;2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD);2023-10-28

4. Fast, Robust and Accurate Detection of Cache-Based Spectre Attack Phases;Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design;2022-10-30

5. Write Me and I’ll Tell You Secrets – Write-After-Write Effects On Intel CPUs;25th International Symposium on Research in Attacks, Intrusions and Defenses;2022-10-26

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3