A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography

03/26/2021
by   Xiaoxuan Lou, et al.
0

Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from the program. In this paper, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. We make three contributions. (1) We survey past research literature to categorize microarchitectural side-channel attacks. Since these are hardware attacks targeting software, we summarize the vulnerable implementations in software, as well as flawed designs in hardware. (2) We identify common strategies to mitigate microarchitectural attacks, from the application, OS and hardware levels. (3) We conduct a large-scale evaluation on popular cryptographic applications in the real world, and analyze the severity, practicality and impact of side-channel vulnerabilities. This survey is expected to inspire side-channel research community to discover new attacks, and more importantly, propose new defense solutions against them.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/21/2019

Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications

We systematize software side-channel attacks with a focus on vulnerabili...
research
09/08/2023

Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

This paper provides the first systematic analysis of a synergistic threa...
research
08/30/2022

Survey on Architectural Attacks: A Unified Classification and Attack Model

According to the World Economic Forum, cyber attacks are considered as o...
research
04/08/2021

Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses

Evolving attacks on the vulnerabilities of the computing systems demand ...
research
06/24/2021

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners

Side-channel attacks extracting sensitive data from implementations have...
research
10/01/2020

BRON – Linking Attack Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations

Many public sources of cyber threat and vulnerability information exist ...
research
09/20/2023

A Survey on Acoustic Side Channel Attacks on Keyboards

In today's digital world, protecting personal and sensitive information ...

Please sign up or login with your details

Forgot password? Click here to reset