Please use this identifier to cite or link to this item:
|Scopus||Web of Science®||Altmetric|
|Title:||A survey of microarchitectural timing attacks and countermeasures on contemporary hardware|
|Citation:||Journal of Cryptographic Engineering, 2018; 8(1):1-27|
|Qian Ge, Yuval Yarom, David Cock, Gernot Heiser|
|Abstract:||Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud computing. We classify types of attacks according to a taxonomy of the shared resources leveraged for such attacks. Moreover, we take a detailed look at attacks used against shared caches. We survey existing countermeasures. We finally discuss trends in attacks, challenges to combating them, and future directions, especially with respect to hardware support.|
|Keywords:||Microarchitectural timing attacks; cache-based timing attacks; countermeasures; trend in the attacks|
|Description:||Published online: 26 December 2016|
|Rights:||© Springer-Verlag Berlin Heidelberg 2016|
|Appears in Collections:||Aurora harvest 3|
Computer Science publications
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.