A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects

被引:0
|
作者
Yuan, Jie [1 ,2 ]
Zhang, Jing [1 ,2 ]
Qiu, Pengfei [1 ,2 ]
Wei, Xinghai [1 ,2 ]
Liu, Dongxiao [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Minist Educ, Key Lab Trustworthy Distributed Comp & Serv BUPT, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 15期
关键词
processer microarchitecture; interconnect; network-on-chip; side channel; covert channel; NETWORK; SECURITY;
D O I
10.3390/app14156699
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With advancements in chip technology, the number of cores in modern commercial processors continues to rise, leading to increased complexity in interconnects and on-chip networks. This complexity, however, exposes significant security vulnerabilities, primarily in the form of side-channel and covert-channel exploits. Unlike other microarchitectural side-channel attacks, those leveraging on-chip interconnects utilize unique characteristics, allowing attackers to develop novel methods that can bypass existing effective defenses. In this paper, we present a comprehensive survey of current side-channel and covert-channel attacks based on processor-on-chip interconnects. We categorize these attacks into three types: contention-based, distance-based, and layout-based, according to the specific interconnect characteristics they exploit, and discuss corresponding countermeasures for each. Finally, we provide an outlook on future development trends in processor interconnect side channels. This survey is the first to specifically focus on interconnect-based side channels in processors.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [22] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [23] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [24] Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
    Wu W.-B.
    Liu Z.
    Yang H.
    Zhang J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 1165 - 1185
  • [25] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [26] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [27] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [28] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [29] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [30] A Survey on Side Channel Attacks in Processor-Memory Chip Stack
    Khoshavi, Navid
    Francois, William
    Maghsoudloo, Mohammad
    Jaimes, Luis
    Sargolzaei, Arman
    2019 IEEE SOUTHEASTCON, 2019,