scispace - formally typeset
Proceedings ArticleDOI

Cache Based Side Channel Attack: A Survey

TLDR
This paper is provide support and background knowledge for new researchers in area of side channel attack in different environments and the strength of prevention method as well as drawbacks of that method.
Abstract
The Cloud Computing (CC) is famous due to shared resources technology. Cloud computing share resources among distrusting customers and provide on demand, cost effective, elasticity services. Due to rapid growth of cloud computing environment, vulnerabilities and their preventions methods are potential increase. We had seen that conventional prevention methods for Side Channel (SC) attack are not suitable for avoidance of cross-VM cashed based SC attacks.In 2016, shared technology issues is a one of top threat consider by cloud security alliance (CSA), which has been published in February 2016 in The Treacherous 12 [1]. This is a under top threat by CSA from last 5 year. In this paper we will discuss multiple method for performing side channel attack and prevention methods. We also discuss the strength of prevention method as well as drawbacks of that method. So that this paper will generate more research scope and new effective idea for prevention of side channel attack, this paper is provide support and background knowledge for new researchers in area of side channel attack in different environments.

read more

Citations
More filters
Journal ArticleDOI

Survey on cross virtual machine side channel attack detection and properties of cloud computing as sustainable material

TL;DR: The main objective of this analysis is to explore various kinds of attacks and its solution model of the cloud, which provides the complete information about cloud resource level security and its solutions.
Book ChapterDOI

Elastic Security for Autonomic Computing Using Intelligent Algorithm

TL;DR: In this paper, the authors focus on the study and analysis of security techniques specifically applied to cloud environments and use a machine learning algorithm to identify threat patterns that enable security of the cloud.
References
More filters
Proceedings ArticleDOI

Cross-VM side channels and their use to extract private keys

TL;DR: This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victims using the most recent version of the libgcrypt cryptographic library.
Proceedings ArticleDOI

New cache designs for thwarting software cache-based side channel attacks

TL;DR: The results show that the new cache designs with built-in security can defend against cache-based side channel attacks in general-rather than only specific attacks on a given cryptographic algorithm-with very little performance degradation and hardware cost.
Proceedings Article

Timing analysis of keystrokes and timing attacks on SSH

TL;DR: A statistical study of users' typing patterns is performed and it is shown that these patterns reveal information about the keys typed, and that timing leaks open a new set of security risks, and hence caution must be taken when designing this type of protocol.
Book ChapterDOI

Cryptanalysis of DES Implemented on Computers with Cache

TL;DR: The results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay as proposed in (11), found that the cipher can be broken with 2 known plaintexts and 2 24 calculations at a success rate > 90%, using a personal computer with 600-MHz Pentium III.
Book ChapterDOI

New results on instruction cache attacks

TL;DR: This work improves instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models, capable of carrying out efficient automated attacks using live I-cache timing data and presents general software countermeasures that can be employed at the kernel and/or compiler level.
Related Papers (5)