2021
DOI: 10.1109/access.2021.3134256
|View full text |Cite
|
Sign up to set email alerts
|

A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor

Abstract: Computer designers have included techniques such as speculative execution and caching to optimize speed and performance. Unfortunately, they could be exploited by the recently discovered cache-side channel attack, spectre. The purpose of this research is to resolve this problem on the open-source RISC-V architecture. Previously, software mitigation techniques and hardware modifications have been investigated on Intel or ARM system to address these issues. However, they are either difficult to implement or have… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…The security model presented by Kwon et al [24] used a deep learning approach to identify the presence of side-channel attacks that are non-profiled. The work carried out by Le et al [25] presents a security model for resisting cache attacks using a neural network. The adoption of a convolution neural network is reported in the work of Mukhtar et al [26] towards addressing dual problems of side-channel attack and dimensional reduction.…”
Section: Existing Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The security model presented by Kwon et al [24] used a deep learning approach to identify the presence of side-channel attacks that are non-profiled. The work carried out by Le et al [25] presents a security model for resisting cache attacks using a neural network. The adoption of a convolution neural network is reported in the work of Mukhtar et al [26] towards addressing dual problems of side-channel attack and dimensional reduction.…”
Section: Existing Approachesmentioning
confidence: 99%
“…(iii) The proposed scheme facilitates the verification of adjacent nodes as well as all other actors in a non-iterative way, which acts as a dual layer of security and increases the frequency of authentication suitable for an extensive dynamic network, unlike the existing approaches , which assess only single target nodes. iv) The proposed scheme is capable of resisting differential fault attacks, power-based attacks, timing attacks and cache attacks, which opens up many opportunities for fighting multiple variants of side-channel attacks, whereas existing approaches [24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] are reported to resist only singular forms of attack.…”
Section: Accomplished Outcomementioning
confidence: 99%
“…It is an open-source ISA compared to other closed-source ISAs such as ARM and x86 [3]. Because of RISC-V openness, it has gained widespread adoption and support, encouraging collaborative work by various communities such as research, education, and industry players [4]. Because of its adaptability and support, RISC-V has emerged as a good choice for various applications, particularly in the Internet of Things (IoT) domain [3].…”
Section: Introductionmentioning
confidence: 99%