Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses

Jakub Szefer
2018 Journal of Hardware and Systems Security  
Over last two decades, side and covert channel research has shown variety of ways of exfiltrating information for a computer system. Processor microarchitectural side and covert channel attacks have emerged as some of the most clever attacks, and ones which are difficult to deal with, without impacting system performance. Unlike electromagnetic or power-based channels, microarchitectural side and covert channel do not require physical proximity to the target device. Instead, only malicious or
more » ... operating spy applications need to be co-located on the same machine as the victim. And in some attacks even co-location is not needed, only timing of the execution of the victim as measured by a remote attacker over the network can form a side channel for information leaks. This survey extracts the key features of the processor's microarchitectural functional units which make the channels possible, presents an analysis and categorization of the variety of microarchitectural side and covert channels others have presented in literature, and surveys existing defense proposals. With advent of cloud computing and ability to launch microarchitectural side and covert channels even across virtual machines, understanding of these channels is critical.
doi:10.1007/s41635-018-0046-1 dblp:journals/jhss/Szefer19 fatcat:zttnnct3abfztal47n2evmb62e