A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
2018
Journal of Hardware and Systems Security
Over last two decades, side and covert channel research has shown variety of ways of exfiltrating information for a computer system. Processor microarchitectural side and covert channel attacks have emerged as some of the most clever attacks, and ones which are difficult to deal with, without impacting system performance. Unlike electromagnetic or power-based channels, microarchitectural side and covert channel do not require physical proximity to the target device. Instead, only malicious or
doi:10.1007/s41635-018-0046-1
dblp:journals/jhss/Szefer19
fatcat:zttnnct3abfztal47n2evmb62e