Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/106687
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGe, Q.-
dc.contributor.authorYarom, Y.-
dc.contributor.authorCock, D.-
dc.contributor.authorHeiser, G.-
dc.date.issued2018-
dc.identifier.citationJournal of Cryptographic Engineering, 2018; 8(1):1-27-
dc.identifier.issn2190-8508-
dc.identifier.issn2190-8516-
dc.identifier.urihttp://hdl.handle.net/2440/106687-
dc.descriptionPublished online: 26 December 2016-
dc.description.abstractMicroarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud computing. We classify types of attacks according to a taxonomy of the shared resources leveraged for such attacks. Moreover, we take a detailed look at attacks used against shared caches. We survey existing countermeasures. We finally discuss trends in attacks, challenges to combating them, and future directions, especially with respect to hardware support.-
dc.description.statementofresponsibilityQian Ge, Yuval Yarom, David Cock, Gernot Heiser-
dc.language.isoen-
dc.publisherSpringer-Verlag-
dc.rights© Springer-Verlag Berlin Heidelberg 2016-
dc.source.urihttp://dx.doi.org/10.1007/s13389-016-0141-6-
dc.subjectMicroarchitectural timing attacks; cache-based timing attacks; countermeasures; trend in the attacks-
dc.titleA survey of microarchitectural timing attacks and countermeasures on contemporary hardware-
dc.typeJournal article-
dc.identifier.doi10.1007/s13389-016-0141-6-
dc.relation.grantARC-
pubs.publication-statusPublished-
dc.identifier.orcidYarom, Y. [0000-0003-0401-4197]-
Appears in Collections:Aurora harvest 3
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.