题名 | A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography |
作者 | |
发表日期 | 2021-07-01
|
DOI | |
发表期刊 | |
ISSN | 0360-0300
|
EISSN | 1557-7341
|
卷号 | 54期号:6 |
摘要 | Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from the program. In this article, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. We make three contributions. (1) We survey past research literature to categorize microarchitectural side-channel attacks. Since these are hardware attacks targeting software, we summarize the vulnerable implementations in software, as well as flawed designs in hardware. (2) We identify common strategies to mitigate microarchitectural attacks, from the application, OS, and hardware levels. (3) We conduct a large-scale evaluation on popular cryptographic applications in the real world and analyze the severity, practicality, and impact of side-channel vulnerabilities. This survey is expected to inspire side-channel research community to discover new attacks, and more importantly, propose new defense solutions against them. ; Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from the program. In this article, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. We make three contributions. (1) We survey past research literature to categorize microarchitectural side-channel attacks. Since these are hardware attacks targeting software, we summarize the vulnerable implementations in software, as well as flawed designs in hardware. (2) We identify common strategies to mitigate microarchitectural attacks, from the application, OS, and hardware levels. (3) We conduct a large-scale evaluation on popular cryptographic applications in the real world and analyze the severity, practicality, and impact of side-channel vulnerabilities. This survey is expected to inspire side-channel research community to discover new attacks, and more importantly, propose new defense solutions against them. |
关键词 | |
相关链接 | [Scopus记录] |
收录类别 | |
语种 | 英语
|
学校署名 | 其他
|
WOS记录号 | WOS:000683036700011
|
EI入藏号 | 20213210740583
|
EI主题词 | Computer hardware
; Surveys
|
EI分类号 | Computer Systems and Equipment:722
|
ESI学科分类 | COMPUTER SCIENCE
|
Scopus记录号 | 2-s2.0-85111966453
|
来源库 | Scopus
|
引用统计 |
被引频次[WOS]:36
|
成果类型 | 期刊论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/242731 |
专题 | 南方科技大学 工学院_计算机科学与工程系 |
作者单位 | 1.Nanyang Technological University,Singapore,Singapore 2.Two Sigma Investments,Lp,United States 3.Southern University of Science and Technology,China |
推荐引用方式 GB/T 7714 |
Lou,Xiaoxuan,Zhang,Tianwei,Jiang,Jun,et al. A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography[J]. ACM COMPUTING SURVEYS,2021,54(6).
|
APA |
Lou,Xiaoxuan,Zhang,Tianwei,Jiang,Jun,&Zhang,Yinqian.(2021).A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography.ACM COMPUTING SURVEYS,54(6).
|
MLA |
Lou,Xiaoxuan,et al."A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography".ACM COMPUTING SURVEYS 54.6(2021).
|
条目包含的文件 | ||||||
文件名称/大小 | 文献类型 | 版本类型 | 开放类型 | 使用许可 | 操作 | |
A Survey of Microarc(722KB) | -- | -- | 限制开放 | -- |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论