Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses

@article{Szefer2016SurveyOM,
  title={Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses},
  author={Jakub Szefer},
  journal={IACR Cryptology ePrint Archive},
  year={2016},
  volume={2016},
  pages={479}
}
  • Jakub Szefer
  • Published 2016 in IACR Cryptology ePrint Archive
Over the last two decades, side and covert channel research has shown a variety of ways of exfiltrating information for a computer system. Processor microarchitectural timing-based side and covert channel attacks have emerged as some of the most clever attacks, and ones which are difficult to deal with, without impacting system performance. Unlike electromagnetic or power-based channels, microarchitectural timing-based side and covert channel do not require physical proximity to the target… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 84 references

Timing channel protection for a shared memory controller

  • Y Wang, A Ferraiuolo, GE Suh
  • Proceedings of the international symposium on…
  • 2014
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…