A Survey on Cache Timing Channel Attacks for Multicore Processors

نویسندگان

چکیده

Cache timing channel attacks has attained a lot of attention in the last decade. These exploits created by significant time gap between cache and main memory accesses. It been successfully implemented to leak secret key various cryptography algorithms. The latest advancements also exploit other micro-architectural components such as hardware prefetchers, branch predictor, replacement engine, addition memory. Detection these is difficult task attacker process running processor must be detected before portion attack complete. major challenge for mitigation defense mechanisms against maintaining system performance while disabling or avoiding attacks. overhead caused detection, mechanism not system’s performance. This paper discusses research carried out three aspects security: attacks, detection techniques details.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cache Replacement Policies for Multicore Processors

Almost all of the modern computers use multiple cores, and the number of cores is expected to increase as hardware prices go down, and Moore’s law fails to hold. Most of the theoretical algorithmic work so far has focused on the setting where multiple cores are performing the same task. Indeed, one is tempted to assume that when the cores are independent then the current design performs well. T...

متن کامل

Cache-Fair Thread Scheduling for Multicore Processors

We present a new operating system scheduling algorithm for multicore processors. Our algorithm reduces the effects of unequal CPU cache sharing that occur on these processors and cause unfair CPU sharing, priority inversion, and inadequate CPU accounting. We describe the implementation of our algorithm in the Solaris operating system and demonstrate that it produces fairer schedules enabling be...

متن کامل

Cache-timing attacks on AES

This paper demonstrates complete AES key recovery from known-plaintext timings of a network server on another computer. This attack should be blamed on the AES design, not on the particular AES library used by the server; it is extremely difficult to write constant-time high-speed AES software for common general-purpose computers. This paper discusses several of the obstacles in detail.

متن کامل

Cache-Timing Template Attacks

Cache-timing attacks are a serious threat to security-critical software. We show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material. We demonstrate its effectiveness by running an attack on the elliptic curve portion of OpenSSL (0...

متن کامل

Performance Implications of Cache Affinity on Multicore Processors

Cache affinity between a process and a processor is observed when the processor cache has accumulated some amount of the process state, i.e., data or instructions. Cache affinity is exploited by OS schedulers: they tend to reschedule processes to run on a recently used processor. On conventional (unicore) multiprocessor systems, exploitation of cache affinity improves performance. It is not yet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of hardware and systems security

سال: 2021

ISSN: ['2509-3436', '2509-3428']

DOI: https://doi.org/10.1007/s41635-021-00115-3