A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the s...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156083 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-156083 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1560832022-05-12T00:26:00Z A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography Lou, Xiaoxuan Zhang, Tianwei Jiang, Jun Zhang, Yinqian School of Computer Science and Engineering Engineering::Computer science and engineering::Computer systems organization::Computer system implementation Microarchitecture Cryptography Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from the program. In this article, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. We make three contributions. (1) We survey past research literature to categorize microarchitectural side-channel attacks. Since these are hardware attacks targeting software, we summarize the vulnerable implementations in software, as well as flawed designs in hardware. (2) We identify common strategies to mitigate microarchitectural attacks, from the application, OS, and hardware levels. (3) We conduct a large-scale evaluation on popular cryptographic applications in the real world and analyze the severity, practicality, and impact of side-channel vulnerabilities. This survey is expected to inspire sidechannel research community to discover new attacks, and more importantly, propose new defense solutions against them. National Research Foundation (NRF) Submitted/Accepted version This project is supported by the National Research Foundation, Singapore, under its National Cybersecurity R&D Pro- gramme (CHFA-GC1-AW03), and NTU Start-up grant. 2022-04-06T00:19:39Z 2022-04-06T00:19:39Z 2021 Journal Article Lou, X., Zhang, T., Jiang, J. & Zhang, Y. (2021). A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography. ACM Computing Surveys, 54(6), 122-. https://dx.doi.org/10.1145/3456629 0360-0300 https://hdl.handle.net/10356/156083 10.1145/3456629 6 54 122 en CHFA-GC1-AW03 ACM Computing Surveys © 2021 Association for Computing Machinery. All rights reserved. This paper was published in ACM Computing Surveys and is made available with permission of Association for Computing Machinery. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering::Computer systems organization::Computer system implementation Microarchitecture Cryptography |
spellingShingle |
Engineering::Computer science and engineering::Computer systems organization::Computer system implementation Microarchitecture Cryptography Lou, Xiaoxuan Zhang, Tianwei Jiang, Jun Zhang, Yinqian A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
description |
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from the program. In this article, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. We make three contributions. (1) We survey past research literature to categorize microarchitectural side-channel attacks. Since these are hardware attacks targeting software, we summarize the vulnerable implementations in software, as well as flawed designs in hardware. (2) We identify common strategies to mitigate microarchitectural attacks, from the application, OS, and hardware levels. (3) We conduct a large-scale evaluation on popular cryptographic applications in the real world and analyze the severity, practicality, and impact of side-channel vulnerabilities. This survey is expected to inspire sidechannel research community to discover new attacks, and more importantly, propose new defense solutions against them. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Lou, Xiaoxuan Zhang, Tianwei Jiang, Jun Zhang, Yinqian |
format |
Article |
author |
Lou, Xiaoxuan Zhang, Tianwei Jiang, Jun Zhang, Yinqian |
author_sort |
Lou, Xiaoxuan |
title |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
title_short |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
title_full |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
title_fullStr |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
title_full_unstemmed |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
title_sort |
survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/156083 |
_version_ |
1734310083402137600 |