Jump to content

Cache timing attack

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Sohom Datta (talk | contribs) at 21:17, 17 November 2023. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by tracking cache access made by the victim system in a shared environment.[1][2][3][4][5]

References

  1. ^ "DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors | IEEE Conference Publication | IEEE Xplore". ieeexplore.ieee.org. Retrieved 2023-11-17.
  2. ^ Van Goethem, Tom; Joosen, Wouter; Nikiforakis, Nick (2015-10-12). "The Clock is Still Ticking: Timing Attacks in the Modern Web". Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. CCS '15. New York, NY, USA: Association for Computing Machinery: 1382–1393. doi:10.1145/2810103.2813632. ISBN 978-1-4503-3832-5.
  3. ^ "Scriptless Timing Attacks on Web Browser Privacy | IEEE Conference Publication | IEEE Xplore". ieeexplore.ieee.org. Retrieved 2023-11-17.
  4. ^ Bonneau, Joseph; Mironov, Ilya (2006). Goubin, Louis; Matsui, Mitsuru (eds.). "Cache-Collision Timing Attacks Against AES". Cryptographic Hardware and Embedded Systems - CHES 2006. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 201–215. doi:10.1007/11894063_16. ISBN 978-3-540-46561-4.
  5. ^ "NetCAT: Practical Cache Attacks from the Network | IEEE Conference Publication | IEEE Xplore". ieeexplore.ieee.org. Retrieved 2023-11-17.