Cache Side-Channel Attacks and Defenses

被引:0
|
作者
Zhang W. [1 ,2 ]
Bai L. [1 ,2 ]
Ling Y. [1 ,2 ]
Lan X. [3 ]
Jia X. [1 ,2 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
[3] Cyber Science Research Institute, Sichuan University, Chengdu
基金
中国国家自然科学基金;
关键词
Attack detection; Cache side-channel attack; CPU cache; Defense strategies; Information system security;
D O I
10.7544/issn1000-1239.202110774
中图分类号
学科分类号
摘要
In recent years, with the development of information technology, cache side-channel attack threats in information system has a rapid growth. It has taken more than 10 years for cache side channel attacks to evolve and develop since cache-timing analysis was proposed to speculate encryption keys. In this survey, we comb the cache side-channel attack threats in the information system by analyzing the vulnerabilities in the design characteristics of software and hardware. Then we summarize the attacks from attack scene, cache levels, attack targets and principles. Further more, we compare the attack conditions, advantages and disadvantages of 7 typical cache side-channel attacks in order to better understand their principles and applications. We also make a systematic analysis of the defense technology against cache side channel attack from detection stage and prevention stage, classify and analyze the defence technology based on different defense principles. Finally, we summarize the work of this paper, discuss the research hotspots and the development trend of cache side-channel attack and defense under the Internet ecosystem, and point out the future research direction of cache side-channel attack and defense, so as to provide reference for researchers who want to start research in this field. © 2023, Science Press. All right reserved.
引用
收藏
页码:206 / 222
页数:16
相关论文
共 111 条
  • [1] Kocher P C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C], Proc of the 16th Annual Int Cryptology Conf on Advances in Cryptology, pp. 104-113, (1996)
  • [2] Zhang Yinqian, Cache side channels: State of the art and research opportunities[C], Proc of the 24th ACM SIGSAC Conf on Computer and Communications Security, pp. 2617-2619, (2017)
  • [3] Aciicmez O, Schindler W, Koc C K., Cache based remote timing attack on the AES[C], Proc of the 7th Cryptographers' Track at the RSA Conf on Topics in Cryptology, pp. 271-286, (2007)
  • [4] Bernstein D J., Cache-timing attacks on AES
  • [5] Weiss M, Heinz B, Stumpf F., A cache timing attack on AES in virtualization environments[C], Proc of the 16th Int Conf on Financial Cryptography and Data Security, pp. 314-328, (2012)
  • [6] Aciicmez O, Koc C K., Trace-driven cache attacks on AES[C], Proc of the 8th Int Conf on Information & Communications Security, pp. 112-121, (2006)
  • [7] Zhang Yinqian, Juels A, Reiter M K, Et al., Cross-VM side channels and their use to extract private keys[C], Proc of the 19th ACM Conf on Computer and Communications Security, pp. 305-316, (2012)
  • [8] Osvik D A, Shamir A, Tromer E., Cache attacks and countermeasures: The case of AES[C], Proc of the 6th Topics in Cryptology-the Cryptographers' Track at the RSA Conf, pp. 1-20, (2006)
  • [9] Percival C., Cache missing for fun and profit
  • [10] Ristenpart T, Tromer E, Shacham H, Et al., Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds[C], Proc of the 16th ACM Conf on Computer and Communications Security, pp. 199-212, (2009)