Reference Hub5
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

Reza Montasari, Amin Hosseinian-Far, Richard Hill, Farshad Montaseri, Mak Sharma, Shahid Shabbir
Copyright: © 2018 |Volume: 8 |Issue: 2 |Pages: 28
ISSN: 1947-9344|EISSN: 1947-9352|EISBN13: 9781522544579|DOI: 10.4018/IJOCI.2018040103
Cite Article Cite Article

MLA

Montasari, Reza, et al. "Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?." IJOCI vol.8, no.2 2018: pp.32-59. http://doi.org/10.4018/IJOCI.2018040103

APA

Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M., & Shabbir, S. (2018). Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?. International Journal of Organizational and Collective Intelligence (IJOCI), 8(2), 32-59. http://doi.org/10.4018/IJOCI.2018040103

Chicago

Montasari, Reza, et al. "Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?," International Journal of Organizational and Collective Intelligence (IJOCI) 8, no.2: 32-59. http://doi.org/10.4018/IJOCI.2018040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how there exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural attacks, the result of these vulnerabilities, take advantage of microarchitectural performance of processor implementations, revealing hidden computing process. Leveraging microarchitectural resources, adversaries can potentially launch timing-based side-channel attacks in order to leak information via timing. In view of these security threats against computing hardware, the authors analyse current attacks that take advantage of microarchitectural elements in shared computing hardware. This analysis focuses only on timing-based side-channel attacks against the components of modern PC platforms - with references being made also to other platforms when relevant - as opposed to any other variations of side-channel attacks which have a broad application range. To this end, the authors analyse timing attacks performed against processor and cache components, again with references to other components when appropriate.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.