Abstract | ||
---|---|---|
The security attack on the computer was mainly caused by software attack using the vulnerability of the operating system or application and physical attacks such as power measurement, electromagnetic measurement and encryption key extraction by noise measurement. However, recent developments of Meltdown and Specter attacks are actively investigating structural weaknesses at the microarchitecture level. This paper introduces the Cache timing attack technique for the analogy of data that is stored in cache and the vulnerability and attack type at the architecture level which is well-known in the past such as Meltdown and Spectre, NetSpectre, etc. Furthermore, this paper also introduces Rowhammer Bug other than CPU which is the attack technique for DRAMs and the DRAM attack caused by Rowhammer Bug which is the attack technique about DRAM. This paper provides information about vulnerability attack cases and technical classifications arising at the architecture level and also introduces recent microarchitecture trend of security threat. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1007/978-3-030-22263-5_80 | INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019 |
Field | DocType | Volume |
Dram,Noise measurement,Cache,Computer science,Computer security,Timing attack,Software,Key (cryptography),Vulnerability,Microarchitecture | Conference | 994 |
ISSN | Citations | PageRank |
2194-5357 | 0 | 0.34 |
References | Authors | |
0 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kwangjun Kim | 1 | 0 | 0.68 |
HeeDong Yang | 2 | 0 | 0.34 |
Byeonggeun Son | 3 | 0 | 0.68 |
Hanjae Yoon | 4 | 0 | 0.34 |
Kangbin Yim | 5 | 310 | 56.23 |
Manhee Lee | 6 | 40 | 9.04 |