Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware. These attacks leverage the unintended artefacts produced as side-effects to certain architectural design choices...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10123915/ |
_version_ | 1797820054958505984 |
---|---|
author | Arsalan Javeed Cemal Yilmaz Erkay Savas |
author_facet | Arsalan Javeed Cemal Yilmaz Erkay Savas |
author_sort | Arsalan Javeed |
collection | DOAJ |
description | Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware. These attacks leverage the unintended artefacts produced as side-effects to certain architectural design choices and proved difficult to be effectively mitigated without incurring significant performance penalties. In this work, we undertake a systematic mapping study of the academic literature related to the aforementioned attacks. We, in particular, pose four research questions and study 104 primary works to answer those questions. We inquire about the origins of artefacts leading up to exploitable settings of microarchitectural side-channel attacks; the effectiveness of the proposed countermeasures; and the lessons to be learned that would help build secure systems for the future. Furthermore, we propose a classification scheme that would also serve in the future for systematic mapping efforts in this scope. |
first_indexed | 2024-03-13T09:32:47Z |
format | Article |
id | doaj.art-ccac75e2ac0e431e8dee750de0a5a840 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-13T09:32:47Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-ccac75e2ac0e431e8dee750de0a5a8402023-05-25T23:00:20ZengIEEEIEEE Access2169-35362023-01-0111489454897610.1109/ACCESS.2023.327575710123915Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping StudyArsalan Javeed0https://orcid.org/0000-0002-8970-6178Cemal Yilmaz1https://orcid.org/0000-0003-4124-2295Erkay Savas2Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, TurkeyFaculty of Engineering and Natural Sciences, Sabanci University, Istanbul, TurkeyFaculty of Engineering and Natural Sciences, Sabanci University, Istanbul, TurkeyOver the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware. These attacks leverage the unintended artefacts produced as side-effects to certain architectural design choices and proved difficult to be effectively mitigated without incurring significant performance penalties. In this work, we undertake a systematic mapping study of the academic literature related to the aforementioned attacks. We, in particular, pose four research questions and study 104 primary works to answer those questions. We inquire about the origins of artefacts leading up to exploitable settings of microarchitectural side-channel attacks; the effectiveness of the proposed countermeasures; and the lessons to be learned that would help build secure systems for the future. Furthermore, we propose a classification scheme that would also serve in the future for systematic mapping efforts in this scope.https://ieeexplore.ieee.org/document/10123915/Cybersecuritymicroarchitectureside-channelsystematic-mapping |
spellingShingle | Arsalan Javeed Cemal Yilmaz Erkay Savas Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study IEEE Access Cybersecurity microarchitecture side-channel systematic-mapping |
title | Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study |
title_full | Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study |
title_fullStr | Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study |
title_full_unstemmed | Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study |
title_short | Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study |
title_sort | microarchitectural side channel threats weaknesses and mitigations a systematic mapping study |
topic | Cybersecurity microarchitecture side-channel systematic-mapping |
url | https://ieeexplore.ieee.org/document/10123915/ |
work_keys_str_mv | AT arsalanjaveed microarchitecturalsidechannelthreatsweaknessesandmitigationsasystematicmappingstudy AT cemalyilmaz microarchitecturalsidechannelthreatsweaknessesandmitigationsasystematicmappingstudy AT erkaysavas microarchitecturalsidechannelthreatsweaknessesandmitigationsasystematicmappingstudy |