A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects

被引:0
|
作者
Yuan, Jie [1 ,2 ]
Zhang, Jing [1 ,2 ]
Qiu, Pengfei [1 ,2 ]
Wei, Xinghai [1 ,2 ]
Liu, Dongxiao [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Minist Educ, Key Lab Trustworthy Distributed Comp & Serv BUPT, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 15期
关键词
processer microarchitecture; interconnect; network-on-chip; side channel; covert channel; NETWORK; SECURITY;
D O I
10.3390/app14156699
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With advancements in chip technology, the number of cores in modern commercial processors continues to rise, leading to increased complexity in interconnects and on-chip networks. This complexity, however, exposes significant security vulnerabilities, primarily in the form of side-channel and covert-channel exploits. Unlike other microarchitectural side-channel attacks, those leveraging on-chip interconnects utilize unique characteristics, allowing attackers to develop novel methods that can bypass existing effective defenses. In this paper, we present a comprehensive survey of current side-channel and covert-channel attacks based on processor-on-chip interconnects. We categorize these attacks into three types: contention-based, distance-based, and layout-based, according to the specific interconnect characteristics they exploit, and discuss corresponding countermeasures for each. Finally, we provide an outlook on future development trends in processor interconnect side channels. This survey is the first to specifically focus on interconnect-based side channels in processors.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [42] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [43] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228
  • [44] Improved side-channel collision attacks on AES
    Bogdanov, Andrey
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 84 - 95
  • [45] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [46] Better Side-Channel Attacks Through Measurements
    Singh, Alok K.
    Gerdes, Ryan M.
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 15 - 26
  • [47] Enhanced Side-Channel Cube Attacks on PRESENT
    Zhao, Xinjie
    Guo, Shize
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie
    Luo, Hao
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 332 - 339
  • [48] Side-Channel Attacks on Fingerprint Matching Algorithms
    Duermuth, Markus
    Oswald, David
    Pastewka, Niklas
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 3 - 13
  • [49] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [50] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21