Proceedings ArticleDOI
Cache Based Side Channel Attack: A Survey
TLDR
This paper is provide support and background knowledge for new researchers in area of side channel attack in different environments and the strength of prevention method as well as drawbacks of that method.Abstract:
The Cloud Computing (CC) is famous due to shared resources technology. Cloud computing share resources among distrusting customers and provide on demand, cost effective, elasticity services. Due to rapid growth of cloud computing environment, vulnerabilities and their preventions methods are potential increase. We had seen that conventional prevention methods for Side Channel (SC) attack are not suitable for avoidance of cross-VM cashed based SC attacks.In 2016, shared technology issues is a one of top threat consider by cloud security alliance (CSA), which has been published in February 2016 in The Treacherous 12 [1]. This is a under top threat by CSA from last 5 year. In this paper we will discuss multiple method for performing side channel attack and prevention methods. We also discuss the strength of prevention method as well as drawbacks of that method. So that this paper will generate more research scope and new effective idea for prevention of side channel attack, this paper is provide support and background knowledge for new researchers in area of side channel attack in different environments.read more
Citations
More filters
Journal ArticleDOI
Survey on cross virtual machine side channel attack detection and properties of cloud computing as sustainable material
TL;DR: The main objective of this analysis is to explore various kinds of attacks and its solution model of the cloud, which provides the complete information about cloud resource level security and its solutions.
Proceedings Article
Blinder: {Partition-Oblivious} Hierarchical Scheduling
Journal Article
Security Issues, Threats And Respective Mitigation In Cloud Computing – A Systematic Review
Book ChapterDOI
Elastic Security for Autonomic Computing Using Intelligent Algorithm
TL;DR: In this paper, the authors focus on the study and analysis of security techniques specifically applied to cloud environments and use a machine learning algorithm to identify threat patterns that enable security of the cloud.
References
More filters
Proceedings ArticleDOI
Cross-VM side channels and their use to extract private keys
TL;DR: This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victims using the most recent version of the libgcrypt cryptographic library.
Proceedings ArticleDOI
New cache designs for thwarting software cache-based side channel attacks
Zhenghong Wang,Ruby B. Lee +1 more
TL;DR: The results show that the new cache designs with built-in security can defend against cache-based side channel attacks in general-rather than only specific attacks on a given cryptographic algorithm-with very little performance degradation and hardware cost.
Proceedings Article
Timing analysis of keystrokes and timing attacks on SSH
TL;DR: A statistical study of users' typing patterns is performed and it is shown that these patterns reveal information about the keys typed, and that timing leaks open a new set of security risks, and hence caution must be taken when designing this type of protocol.
Book ChapterDOI
Cryptanalysis of DES Implemented on Computers with Cache
TL;DR: The results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay as proposed in (11), found that the cipher can be broken with 2 known plaintexts and 2 24 calculations at a success rate > 90%, using a personal computer with 600-MHz Pentium III.
Book ChapterDOI
New results on instruction cache attacks
TL;DR: This work improves instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models, capable of carrying out efficient automated attacks using live I-cache timing data and presents general software countermeasures that can be employed at the kernel and/or compiler level.
Related Papers (5)
A Novel Approach to Prevent Cache-based Side-Channel Attack in the Cloud
Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform
Liu Fei,Lanfang Ren,Bai Hongtao +2 more