A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.

INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019(2020)

引用 0|浏览36
暂无评分
摘要
The security attack on the computer was mainly caused by software attack using the vulnerability of the operating system or application and physical attacks such as power measurement, electromagnetic measurement and encryption key extraction by noise measurement. However, recent developments of Meltdown and Specter attacks are actively investigating structural weaknesses at the microarchitecture level. This paper introduces the Cache timing attack technique for the analogy of data that is stored in cache and the vulnerability and attack type at the architecture level which is well-known in the past such as Meltdown and Spectre, NetSpectre, etc. Furthermore, this paper also introduces Rowhammer Bug other than CPU which is the attack technique for DRAMs and the DRAM attack caused by Rowhammer Bug which is the attack technique about DRAM. This paper provides information about vulnerability attack cases and technical classifications arising at the architecture level and also introduces recent microarchitecture trend of security threat.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要