• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Miao Xinliang, Jiang Liehui, Chang Rui. Survey of Access-Driven Cache-Based Side Channel Attack[J]. Journal of Computer Research and Development, 2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581
Citation: Miao Xinliang, Jiang Liehui, Chang Rui. Survey of Access-Driven Cache-Based Side Channel Attack[J]. Journal of Computer Research and Development, 2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581

Survey of Access-Driven Cache-Based Side Channel Attack

Funds: This work was supported by the National Natural Science Foundation of China (61802431).
More Information
  • Published Date: March 31, 2020
  • In recent years, massive heterogeneous IoT (Internet of things) terminal devices carry the core functions, and they are easier to be the direct targets of attackers. Besides, more terminal devices and cloud platforms are suffering from cache-based side channel attacks. These attacks construct the fine-grained and the concealed cache side channel to extract sensitive data (such as encryption keys) from the target devices, which defeats the isolation mechanism. In this paper, we focus on access-driven cache-based side channel attack technology. Firstly, the fundamental principle and the current research status of cache-based side channel attack are present. Then, "Evict+Reload" attack, "Prime+Probe" attack and "Flush+Reload" attack, which belong to access-driven cache-based side channel attack, are described mainly. Especially, the attack principle, implementation process and attack effect are elaborated through theoretical analysis and experimental verification. After that, the characteristics and applications of the above three attacks are discussed, and the comparison results are given. Furthermore, the current challenges in LLC (last-level cache) attack and noise elimination are proposed. Finally, the future research directions are pointed out in the era of IoE (Internet of everything), in terms of the gradual change of the cache hierarchy, the massive data storage of the cloud platforms, and the widespread deployment of TEE (trusted execution environment) on physical devices.
  • Related Articles

    [1]Qian Zhongsheng, Huang Heng, Zhu Hui, Liu Jinping. Multi-Perspective Graph Contrastive Learning Recommendation Method with Layer Attention Mechanism[J]. Journal of Computer Research and Development, 2025, 62(1): 160-178. DOI: 10.7544/issn1000-1239.202330804
    [2]Wei Shaopeng, Liang Ting, Zhao Yu, Zhuang Fuzhen, Ren Fuji. Multi-View Heterogeneous Graph Neural Network Method for Enterprise Credit Risk Assessment[J]. Journal of Computer Research and Development, 2024, 61(8): 1957-1967. DOI: 10.7544/issn1000-1239.202440126
    [3]Yang Jieyi, Dong Yihong, Qian Jiangbo. Research Progress of Few-Shot Learning Methods Based on Graph Neural Networks[J]. Journal of Computer Research and Development, 2024, 61(4): 856-876. DOI: 10.7544/issn1000-1239.202220933
    [4]Ye Guixin, Zhang Yuxiang, Zhang Cheng, Zhao Jiaqi, Wang Huanting. Automatic Optimization Heuristics Method for OpenCL Program Based on Graph Neural Network[J]. Journal of Computer Research and Development, 2023, 60(5): 1121-1135. DOI: 10.7544/issn1000-1239.202110943
    [5]Huang Heyan, Liu Xiao, Liu Qian. Knowledge-Enhanced Graph Encoding Method for Metaphor Detection in Text[J]. Journal of Computer Research and Development, 2023, 60(1): 140-152. DOI: 10.7544/issn1000-1239.202110927
    [6]Xie Xiaojie, Liang Ying, Wang Zisen, Liu Zhengjun. Heterogeneous Network Node Classification Method Based on Graph Convolution[J]. Journal of Computer Research and Development, 2022, 59(7): 1470-1485. DOI: 10.7544/issn1000-1239.20210124
    [7]Liu Linlan, Tan Zhenyang, Shu Jian. Node Importance Estimation Method for Opportunistic Network Based on Graph Neural Networks[J]. Journal of Computer Research and Development, 2022, 59(4): 834-851. DOI: 10.7544/issn1000-1239.20200673
    [8]Sun Yawei, Cheng Gong, Li Xiao, Qu Yuzhong. Graph Matching Network for Interpretable Complex Question Answering over Knowledge Graphs[J]. Journal of Computer Research and Development, 2021, 58(12): 2673-2683. DOI: 10.7544/issn1000-1239.2021.20211004
    [9]Chen Jinyin, Huang Guohan, Zhang Dunjie, Zhang Xuhong, Ji Shouling. GRD-GNN: Graph Reconstruction Defense for Graph Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1075-1091. DOI: 10.7544/issn1000-1239.2021.20200935
    [10]Wu Jinyu, Jin Shuyuan, Yang Zhi. Analysis of Attack Graphs Based on Network Flow Method[J]. Journal of Computer Research and Development, 2011, 48(8): 1497-1505.

Catalog

    Article views (1514) PDF downloads (950) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return