Cryptology ePrint Archive: Report 2016/613

A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware

Qian Ge and Yuval Yarom and David Cock and Gernot Heiser

Abstract: Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud computing. We classify types of attacks according to a taxonomy of the shared resources leveraged for such attacks. Moreover, we take a detailed look at attacks used against shared caches. We survey existing countermeasures. We finally discuss trends in attacks, challenges to combating them, and future directions, especially with respect to hardware support.

Category / Keywords: Microarchitectural timing attacks, Cache-based timing attacks, Countermeasures, Trend in the attacks

Original Publication (in the same form): Journal of Cryptographic Engineering
DOI:
10.1007/s13389-016-0141-6

Date: received 11 Jun 2016, last revised 24 Oct 2016

Contact author: qian ge at data61 csiro au

Available format(s): PDF | BibTeX Citation

Version: 20161024:233015 (All versions of this report)

Short URL: ia.cr/2016/613

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]