• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Miao Xinliang, Jiang Liehui, Chang Rui. Survey of Access-Driven Cache-Based Side Channel Attack[J]. Journal of Computer Research and Development, 2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581
Citation: Miao Xinliang, Jiang Liehui, Chang Rui. Survey of Access-Driven Cache-Based Side Channel Attack[J]. Journal of Computer Research and Development, 2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581

Survey of Access-Driven Cache-Based Side Channel Attack

Funds: This work was supported by the National Natural Science Foundation of China (61802431).
More Information
  • Published Date: March 31, 2020
  • In recent years, massive heterogeneous IoT (Internet of things) terminal devices carry the core functions, and they are easier to be the direct targets of attackers. Besides, more terminal devices and cloud platforms are suffering from cache-based side channel attacks. These attacks construct the fine-grained and the concealed cache side channel to extract sensitive data (such as encryption keys) from the target devices, which defeats the isolation mechanism. In this paper, we focus on access-driven cache-based side channel attack technology. Firstly, the fundamental principle and the current research status of cache-based side channel attack are present. Then, "Evict+Reload" attack, "Prime+Probe" attack and "Flush+Reload" attack, which belong to access-driven cache-based side channel attack, are described mainly. Especially, the attack principle, implementation process and attack effect are elaborated through theoretical analysis and experimental verification. After that, the characteristics and applications of the above three attacks are discussed, and the comparison results are given. Furthermore, the current challenges in LLC (last-level cache) attack and noise elimination are proposed. Finally, the future research directions are pointed out in the era of IoE (Internet of everything), in terms of the gradual change of the cache hierarchy, the massive data storage of the cloud platforms, and the widespread deployment of TEE (trusted execution environment) on physical devices.
  • Cited by

    Periodical cited type(8)

    1. 邱朋飞,孙日辉,王春露,汪东升. 现代处理器低功耗漏洞发现与利用. 中国科学:信息科学. 2025(02): 297-325 .
    2. 徐杰,吴茂雪. 基于数据中心的数据传输网络拓扑结构及拥塞控制研究. 中国高新科技. 2024(21): 27-28+31 .
    3. 杨帆,张倩颖,施智平,关永. 可信执行环境软件侧信道攻击研究综述. 软件学报. 2023(01): 381-403 .
    4. 黎秀,潘虹,朱镕申. 移动终端软件高速缓存侧信道脆弱性识别仿真. 计算机仿真. 2022(02): 496-500 .
    5. 王崇,魏帅,张帆,宋克. 缓存侧信道防御研究综述. 计算机研究与发展. 2021(04): 794-810 . 本站查看
    6. 丛眸,张平,王宁. 针对KASLR的Linux计时攻击方法. 计算机工程. 2021(08): 177-182 .
    7. 高岩,资郴琛,冯四风,顾青. 面向拟态防御理论构造Web网关的安全调度算法. 小型微型计算机系统. 2021(09): 1913-1919 .
    8. 李志峰,高玉琢. 基于高速缓存的侧信道攻击方法研究. 网络安全技术与应用. 2021(09): 4-7 .

    Other cited types(3)

Catalog

    Article views (1521) PDF downloads (952) Cited by(11)
    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return