Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by tracking cache access made by the victim system in a shared environment.[1][2][3][4][5]
References
↑ Kiriansky, Vladimir; Lebedev, Ilia; Amarasinghe, Saman; Devadas, Srinivas; Emer, Joel (2018). "DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors". 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). pp.974–987. doi:10.1109/MICRO.2018.00083. hdl:1721.1/124388. ISBN978-1-5386-6240-3. S2CID44165047.
↑ Liang, Bin; You, Wei; Liu, Liangkun; Shi, Wenchang; Heiderich, Mario (2014). "Scriptless Timing Attacks on Web Browser Privacy". 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. pp.112–123. doi:10.1109/DSN.2014.93. ISBN978-1-4799-2233-8. S2CID2583517.
↑ Bonneau, Joseph; Mironov, Ilya (2006). "Cache-Collision Timing Attacks Against AES". In Goubin, Louis; Matsui, Mitsuru (eds.). Cryptographic Hardware and Embedded Systems - CHES 2006. Lecture Notes in Computer Science. Vol.4249. Berlin, Heidelberg: Springer. pp.201–215. doi:10.1007/11894063_16. ISBN978-3-540-46561-4.
↑ Kurth, Michael; Gras, Ben; Andriesse, Dennis; Giuffrida, Cristiano; Bos, Herbert; Razavi, Kaveh (2020). "NetCAT: Practical Cache Attacks from the Network". 2020 IEEE Symposium on Security and Privacy (SP). pp.20–38. doi:10.1109/SP40000.2020.00082. ISBN978-1-7281-3497-0. S2CID202751810.
This page is based on this Wikipedia article Text is available under the CC BY-SA 4.0 license; additional terms may apply. Images, videos and audio are available under their respective licenses.