Title
A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.
Abstract
The security attack on the computer was mainly caused by software attack using the vulnerability of the operating system or application and physical attacks such as power measurement, electromagnetic measurement and encryption key extraction by noise measurement. However, recent developments of Meltdown and Specter attacks are actively investigating structural weaknesses at the microarchitecture level. This paper introduces the Cache timing attack technique for the analogy of data that is stored in cache and the vulnerability and attack type at the architecture level which is well-known in the past such as Meltdown and Spectre, NetSpectre, etc. Furthermore, this paper also introduces Rowhammer Bug other than CPU which is the attack technique for DRAMs and the DRAM attack caused by Rowhammer Bug which is the attack technique about DRAM. This paper provides information about vulnerability attack cases and technical classifications arising at the architecture level and also introduces recent microarchitecture trend of security threat.
Year
DOI
Venue
2019
10.1007/978-3-030-22263-5_80
INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019
Field
DocType
Volume
Dram,Noise measurement,Cache,Computer science,Computer security,Timing attack,Software,Key (cryptography),Vulnerability,Microarchitecture
Conference
994
ISSN
Citations 
PageRank 
2194-5357
0
0.34
References 
Authors
0
6
Name
Order
Citations
PageRank
Kwangjun Kim100.68
HeeDong Yang200.34
Byeonggeun Son300.68
Hanjae Yoon400.34
Kangbin Yim531056.23
Manhee Lee6409.04