Jump to content

Cache timing attack

From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by tracking cache access made by the victim system in a shared environment.[1][2][3][4][5]

References

  1. ^ Kiriansky, Vladimir; Lebedev, Ilia; Amarasinghe, Saman; Devadas, Srinivas; Emer, Joel (2018). "DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors". 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). pp. 974–987. doi:10.1109/MICRO.2018.00083. hdl:1721.1/124388. ISBN 978-1-5386-6240-3. S2CID 44165047. Retrieved 2023-11-17.
  2. ^ Van Goethem, Tom; Joosen, Wouter; Nikiforakis, Nick (2015-10-12). "The Clock is Still Ticking: Timing Attacks in the Modern Web". Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery. pp. 1382–1393. doi:10.1145/2810103.2813632. ISBN 978-1-4503-3832-5. S2CID 17705638.
  3. ^ Liang, Bin; You, Wei; Liu, Liangkun; Shi, Wenchang; Heiderich, Mario (2014). "Scriptless Timing Attacks on Web Browser Privacy". 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. pp. 112–123. doi:10.1109/DSN.2014.93. ISBN 978-1-4799-2233-8. S2CID 2583517. Retrieved 2023-11-17.
  4. ^ Bonneau, Joseph; Mironov, Ilya (2006). "Cache-Collision Timing Attacks Against AES". In Goubin, Louis; Matsui, Mitsuru (eds.). Cryptographic Hardware and Embedded Systems - CHES 2006. Lecture Notes in Computer Science. Vol. 4249. Berlin, Heidelberg: Springer. pp. 201–215. doi:10.1007/11894063_16. ISBN 978-3-540-46561-4.
  5. ^ Kurth, Michael; Gras, Ben; Andriesse, Dennis; Giuffrida, Cristiano; Bos, Herbert; Razavi, Kaveh (2020). "NetCAT: Practical Cache Attacks from the Network". 2020 IEEE Symposium on Security and Privacy (SP). pp. 20–38. doi:10.1109/SP40000.2020.00082. ISBN 978-1-7281-3497-0. S2CID 202751810. Retrieved 2023-11-17.