首页|瞬态执行攻击防御方法研究进展

瞬态执行攻击防御方法研究进展

扫码查看
瞬态执行攻击利用处理器微架构的实现特性窃取秘密,并通过缓存侧信道泄露秘密相关信息,对现代商用处理器的信息安全构成了极大威胁。随着攻击研究的不断深入,其防御方法也成为了研究热点。对瞬态执行攻击防御技术发展现状进行了系统性总结,剖析了熔断型攻击、幽灵型攻击、数据采样型攻击和缓存隐蔽信道的形成原因及分类依据;总结了防御方法的实现原理与发展现状,依据防御措施的介入阶段将其分为四类:基于代码检测的、基于破坏瞬态行为的、基于中断隐蔽信道的和面向攻击检测的防御方法,其中,特别总结了结合机器学习的攻击检测方法。对现有防御研究中存在的关键问题进行了分析与总结,并展望了未来的研究方向,以期为后续研究工作提供帮助。
Research Progress in Transient Execution Attack Defense Technologies
Transient execution attack(TEA)exploits the implementation characteristics of the central processor microar-chitecture to steal secrets,and leak secret-related information through cache side channels,thereby posing a great threat to the information security of modern commercial processors.With the continuous deepening of attack research,its defense methods have also become a research hotspot.This paper systematically summarizes the development status of TEA defense technologies,and analyzes the underlying causes and classification criteria of meltdown-type attack,spectre-type attack,and microarchitecture data sampling(MDS)type attack and cache convert channels.Subsequently,the implementation principles and development status of defense methods are summarized,and they are classified into four categories based on the intervention stage of defense measures:code detection based,transient behavior destruction based,interrupt covert channel-based,and attack detection-oriented defense methods,specifically the attack detection method combined with machine learning is summarized.Finally,the key issues existing in the existing research work are analyzed and summa-rized,and the future research directions are prospected,in order to provide assistance for the subsequent research work.

system securitytransient execution attackscache side channeldefense methodsprocessor security

李扬、高菲、马自强、苗莉

展开 >

宁夏大学 信息工程学院,银川 750021

宁夏"东数西算"人工智能与信息安全重点实验室,银川 750021

宁夏大数据与人工智能省部共建协同创新中心,银川 750021

系统安全 瞬态执行攻击 缓存侧信道 防御方法 处理器安全

2025

计算机工程与应用
华北计算技术研究所

计算机工程与应用

北大核心
影响因子:0.683
ISSN:1002-8331
年,卷(期):2025.61(2)