Meet the Sherlock Holmes' of Side Channel Leakage: A Survey of Cache SCA Detection Techniques

被引:17
作者
Akram, Ayaz [1 ]
Mushtaq, Maria [2 ]
Bhatti, Muhammad Khurram [3 ]
Lapotre, Vianney [4 ]
Gogniat, Guy [4 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Univ Montpellier, CNRS, LIRMM, F-34095 Montpellier, France
[3] Informat Technol Univ, Dept Elect Engn, Lahore 54890, Pakistan
[4] Univ South Brittany, Lab STICC, F-56100 Lorient, France
关键词
Cache-based side channel attacks (SCAs); cryptography; survey; detection; machine learning; anomaly & signature detection; TIMING ATTACKS; TIME; MECHANISMS; SUPPORT; CLOUD;
D O I
10.1109/ACCESS.2020.2980522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since, these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous. Detection of cache side channel attacks is an important step towards mitigating against such hostile entities. Researchers have already proposed different techniques to detect cache side channel attacks. This paper provides a detailed survey of literature related to the state-of-the-art detection techniques for cache based side channel attacks. We identify a set of important characteristics that can be used to characterize a CSCA (cache side channel attack) detection technique. We use the identified features to compare and contrast the most important detection techniques and provide the important observations. We also identify some of the challenges that the research community will have to resolve in future to improve the efficiency of cache side channel detection techniques. To the best of our knowledge, this is the first work to do such a study. We believe that this paper will prove useful to researchers in the area of systems security.
引用
收藏
页码:70836 / 70860
页数:25
相关论文
共 176 条
[1]  
Abed A.S., 2015, Globecom Workshops (GC Wkshps), P1
[2]  
Aciiçmez O, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P11
[3]  
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
[4]  
Aciiçmez O, 2006, LECT NOTES COMPUT SC, V4307, P112
[5]  
Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
[6]  
Aciiçqmez O, 2008, LECT NOTES COMPUT SC, V4964, P256, DOI 10.1007/978-3-540-79263-5_16
[7]  
Alam M., 2017, IACR Cryptol. ePrint Arch.
[8]   ConfMVM: A Hardware-Assisted Model to Confine Malicious VMs [J].
Allaf, Zirak ;
Adda, Mo ;
Gegov, Alexander .
2018 UKSIM-AMSS 20TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2018, :49-54
[9]  
Allaf Zirak, 2017, Advances in Computational Intelligence, P203
[10]   Amplifying Side Channels Through Performance Degradation [J].
Allan, Thomas ;
Brumley, Billy Bob ;
Falkner, Katrina ;
van de Pol, Joop ;
Yarom, Yuval .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :422-435