SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations

12/20/2022
by   Nadja Ramhöj Holtryd, et al.
0

Microarchitectural optimizations are expected to play a crucial role in ensuring performance scalability in future technology nodes. However, recent attacks have demonstrated that microarchitectural optimizations, which were assumed to be secure, can be exploited. Moreover, new attacks surface at a rapid pace limiting the scope of existing defenses. These developments prompt the need to review microarchitectural optimizations with an emphasis on security, understand the attack landscape and the potential defense strategies. We analyze timing-based side-channel attacks targeting a diverse set of microarchitectural optimizations. We provide a framework for analysing non-transient and transient attacks, which highlights the similarities. We identify the four root causes of timing-based side-channel attacks: determinism, sharing, access violation and information flow, through our systematic analysis. Our key insight is that a subset (or all) of the root causes are exploited by attacks and eliminating any of the exploited root causes, in any attack step, is enough to provide protection. Leveraging our framework, we systematize existing defenses and show that they target these root causes in the different attack steps.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/13/2018

A Systematic Evaluation of Transient Execution Attacks and Defenses

Modern processor optimizations such as branch prediction and out-of-orde...
research
09/17/2020

New Models for Understanding and Reasoning about Speculative Execution Attacks

Spectre and Meltdown attacks and their variants exploit hardware perform...
research
04/08/2021

Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses

Evolving attacks on the vulnerabilities of the computing systems demand ...
research
02/11/2023

Transient Attack against the KLJN Secure Key Exchanger

We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Joh...
research
03/15/2022

SoK: Why Have Defenses against Social Engineering Attacks Achieved Limited Success?

Social engineering attacks are a major cyber threat because they often s...
research
09/15/2022

Defending Root DNS Servers Against DDoS Using Layered Defenses

Distributed Denial-of-Service (DDoS) attacks exhaust resources, leaving ...
research
09/09/2023

Transient Attack against the VMG-KLJN Secure Key Exchanger

The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchh...

Please sign up or login with your details

Forgot password? Click here to reset