Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study

Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware. These attacks leverage the unintended artefacts produced as side-effects to certain architectural design choices...

Full description

Bibliographic Details
Main Authors: Arsalan Javeed, Cemal Yilmaz, Erkay Savas
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10123915/
_version_ 1797820054958505984
author Arsalan Javeed
Cemal Yilmaz
Erkay Savas
author_facet Arsalan Javeed
Cemal Yilmaz
Erkay Savas
author_sort Arsalan Javeed
collection DOAJ
description Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware. These attacks leverage the unintended artefacts produced as side-effects to certain architectural design choices and proved difficult to be effectively mitigated without incurring significant performance penalties. In this work, we undertake a systematic mapping study of the academic literature related to the aforementioned attacks. We, in particular, pose four research questions and study 104 primary works to answer those questions. We inquire about the origins of artefacts leading up to exploitable settings of microarchitectural side-channel attacks; the effectiveness of the proposed countermeasures; and the lessons to be learned that would help build secure systems for the future. Furthermore, we propose a classification scheme that would also serve in the future for systematic mapping efforts in this scope.
first_indexed 2024-03-13T09:32:47Z
format Article
id doaj.art-ccac75e2ac0e431e8dee750de0a5a840
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-13T09:32:47Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-ccac75e2ac0e431e8dee750de0a5a8402023-05-25T23:00:20ZengIEEEIEEE Access2169-35362023-01-0111489454897610.1109/ACCESS.2023.327575710123915Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping StudyArsalan Javeed0https://orcid.org/0000-0002-8970-6178Cemal Yilmaz1https://orcid.org/0000-0003-4124-2295Erkay Savas2Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, TurkeyFaculty of Engineering and Natural Sciences, Sabanci University, Istanbul, TurkeyFaculty of Engineering and Natural Sciences, Sabanci University, Istanbul, TurkeyOver the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware. These attacks leverage the unintended artefacts produced as side-effects to certain architectural design choices and proved difficult to be effectively mitigated without incurring significant performance penalties. In this work, we undertake a systematic mapping study of the academic literature related to the aforementioned attacks. We, in particular, pose four research questions and study 104 primary works to answer those questions. We inquire about the origins of artefacts leading up to exploitable settings of microarchitectural side-channel attacks; the effectiveness of the proposed countermeasures; and the lessons to be learned that would help build secure systems for the future. Furthermore, we propose a classification scheme that would also serve in the future for systematic mapping efforts in this scope.https://ieeexplore.ieee.org/document/10123915/Cybersecuritymicroarchitectureside-channelsystematic-mapping
spellingShingle Arsalan Javeed
Cemal Yilmaz
Erkay Savas
Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
IEEE Access
Cybersecurity
microarchitecture
side-channel
systematic-mapping
title Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
title_full Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
title_fullStr Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
title_full_unstemmed Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
title_short Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
title_sort microarchitectural side channel threats weaknesses and mitigations a systematic mapping study
topic Cybersecurity
microarchitecture
side-channel
systematic-mapping
url https://ieeexplore.ieee.org/document/10123915/
work_keys_str_mv AT arsalanjaveed microarchitecturalsidechannelthreatsweaknessesandmitigationsasystematicmappingstudy
AT cemalyilmaz microarchitecturalsidechannelthreatsweaknessesandmitigationsasystematicmappingstudy
AT erkaysavas microarchitecturalsidechannelthreatsweaknessesandmitigationsasystematicmappingstudy