A State Transition Based Cache Side Channel Attack Model

نویسندگان

چکیده

Abstract Over the last decades, Cache Side Channel Attack (CSCA) seriously threatens security of user information, which repeatedly highlights cache. Even though secure cache design can mitigate or defend against this attack, high period and tap-out cost reduce development specific designs. Therefore, many researchers focus on proposing a model to analyse CSCA simplify design. Nowadays, be divided into 1) Indicator analysis model; 2) verify 3) abstract model. However, most these models establishment phase CSCA, regardless usage CSCA. On other hand, granularity is either entire single line, can’t describe behaviour in clearly. To overcome limitations, we proposed novel based state transition gave formal specification by work. Firstly, summarize 11 basic states set point target process Then from three aspects: pre-attack cost, detection accuracy, gives more comprehensive

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Statistics-based Fundamental Model for Side-channel Attack Analysis

Side-channel attacks (SCAs) exploit leakage from the physical implementation of cryptographic algorithms to recover the otherwise secret information. In the last decade, popular SCAs like differential power analysis (DPA) and correlation power analysis (CPA) have been invented and demonstrated to be realistic threats to many critical embedded systems. However, there is still no sound and provab...

متن کامل

IDP: An Analysis of a Cache-Based Timing Side Channel Attack and a Countermeasure on PikeOS

Virtualization has become of increasing importance for the security of embedded systems during the last years. One of the major threats to this security is posed by side channel attacks. In this work, Bernstein’s time-driven cache-based timing attack against AES is revisited in a virtualization security scenario and the PikeOS micro kernel system is presented. A novel countermeasure against tim...

متن کامل

Power Analysis Based Side Channel Attack

Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...

متن کامل

Eviction Bit and Inclusive Cache Based Replacement Policy for Side Channel Attack

Modern Cloud Computing Architecture shares physical resources throughout diverse programs so as to maximize the efficiency based on area, energy, and cost. In the most widelyused environment, where each core has more than single level private caches, and shares an inclusive lower-level cache with all the other cores. Regrettably, sharing causes a hazard to security, though procedures are comple...

متن کامل

FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack

Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the Flush+Reload attack enables a spy program to recover over 98% of the bits of the private key in a single decryption or signing round. Unlike previous attacks, the attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of physics

سال: 2022

ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']

DOI: https://doi.org/10.1088/1742-6596/2333/1/012014