Northampton Electronic Collection of Theses and Research

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018) Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? International Journal of Organizational and Collective Intelligence (IJOCI). 8(2) 1947-9344.

Item Type: Article
Abstract: There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance of processor implementations, revealing hidden computing process. Leveraging Microarchitectural resources, adversaries can potentially launch Timing-Based Side-Channel Attacks in order to leak information via timing. In view of these security threats against computing hardware, we analyse current attacks that take advantage of Microarchitectural elements in shared computing hardware. Our analysis focuses only on Timing-Based Side-Channel Attacks against the components of modern PC platforms - with references being made also to other platforms when relevant - as opposed to any other variations of Side-Channel Attacks which have a broad application range. To this end, we analyse Timing Attacks performed against processor and cache components, again with references to other components when appropriate.
Uncontrolled Keywords: Side-channel attacks, hardware vulnerabilities, microarchitectural attacks, processor, attack taxonomy
Creators: Montasari, Reza, Hosseinian-Far, Amin, Hill, Richard, Montaseri, Farshad, Sharma, Mak and Shabbir, Shahid
Faculties, Divisions and Institutes: Faculties > Faculty of Arts, Science & Technology > Computing
Faculties > Faculty of Business & Law > International Strategy & Business
Date: 1 April 2018
Date Type: Publication
Journal or Publication Title: International Journal of Organizational and Collective Intelligence (IJOCI)
Volume: 8
Number: 2
Language: English
DOI: https://doi.org/10.4018/IJOCI.2018040103
ISSN: 1947-9344
Status: Published / Disseminated
Refereed: Yes
URI: http://nectar.northampton.ac.uk/id/eprint/10630

Actions (login required)

Edit Item Edit Item