2019
DOI: 10.1504/ijesdf.2019.10020551
|View full text |Cite
|
Sign up to set email alerts
|

Countermeasures for timing-based side-channel attacks against shared, modern computing hardware

Abstract: There are several vulnerabilities in computing systems hardware that can be exploited by attackers to carry out devastating Microarchitectural Timing-Based Side-Channel Attacks against these systems and as a result compromise the security of the users of such systems. By exploiting Microarchitectural resources, adversaries can potentially launch different variants of Timing Attacks, for instance, to leak sensitive information through timing. In view of these security threats against computing hardware, in a re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 79 publications
0
1
0
Order By: Relevance
“…To address this limitation, a virtualisation hypervisor mediates access between guest OSs and the physical compute resources. However, hypervisors, themselves, have displayed signs of vulnerabilities that have enabled the guest OSs to gain inappropriate levels of co n tro l or influence on the underlying platform (Alliance, Coud Sercurity, 2010;M o n tasari, et al, 2018b;Montasari, et al, 2019a;Montasari, et al, 2019e;Montasari, et al, 2019f;Montasari, et al, 2019g). The following sub sections describe various scenarios in which flaws in hypervisors can be exploited to perpetrate cyber-attacks in CCEs.…”
Section: Hypervisor-based Attacksmentioning
confidence: 99%
“…To address this limitation, a virtualisation hypervisor mediates access between guest OSs and the physical compute resources. However, hypervisors, themselves, have displayed signs of vulnerabilities that have enabled the guest OSs to gain inappropriate levels of co n tro l or influence on the underlying platform (Alliance, Coud Sercurity, 2010;M o n tasari, et al, 2018b;Montasari, et al, 2019a;Montasari, et al, 2019e;Montasari, et al, 2019f;Montasari, et al, 2019g). The following sub sections describe various scenarios in which flaws in hypervisors can be exploited to perpetrate cyber-attacks in CCEs.…”
Section: Hypervisor-based Attacksmentioning
confidence: 99%