A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

dc.contributor.authorGe, Q.
dc.contributor.authorYarom, Y.
dc.contributor.authorCock, D.
dc.contributor.authorHeiser, G.
dc.date.issued2018
dc.descriptionPublished online: 26 December 2016
dc.description.abstractMicroarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud computing. We classify types of attacks according to a taxonomy of the shared resources leveraged for such attacks. Moreover, we take a detailed look at attacks used against shared caches. We survey existing countermeasures. We finally discuss trends in attacks, challenges to combating them, and future directions, especially with respect to hardware support.
dc.description.statementofresponsibilityQian Ge, Yuval Yarom, David Cock, Gernot Heiser
dc.identifier.citationJournal of Cryptographic Engineering, 2018; 8(1):1-27
dc.identifier.doi10.1007/s13389-016-0141-6
dc.identifier.issn2190-8508
dc.identifier.issn2190-8516
dc.identifier.orcidYarom, Y. [0000-0003-0401-4197]
dc.identifier.urihttp://hdl.handle.net/2440/106687
dc.language.isoen
dc.publisherSpringer-Verlag
dc.relation.grantARC
dc.rights© Springer-Verlag Berlin Heidelberg 2016
dc.source.urihttps://doi.org/10.1007/s13389-016-0141-6
dc.subjectMicroarchitectural timing attacks; cache-based timing attacks; countermeasures; trend in the attacks
dc.titleA survey of microarchitectural timing attacks and countermeasures on contemporary hardware
dc.typeJournal article
pubs.publication-statusPublished

Files