Research Progress in Transient Execution Attack Defense Technologies
Transient execution attack(TEA)exploits the implementation characteristics of the central processor microar-chitecture to steal secrets,and leak secret-related information through cache side channels,thereby posing a great threat to the information security of modern commercial processors.With the continuous deepening of attack research,its defense methods have also become a research hotspot.This paper systematically summarizes the development status of TEA defense technologies,and analyzes the underlying causes and classification criteria of meltdown-type attack,spectre-type attack,and microarchitecture data sampling(MDS)type attack and cache convert channels.Subsequently,the implementation principles and development status of defense methods are summarized,and they are classified into four categories based on the intervention stage of defense measures:code detection based,transient behavior destruction based,interrupt covert channel-based,and attack detection-oriented defense methods,specifically the attack detection method combined with machine learning is summarized.Finally,the key issues existing in the existing research work are analyzed and summa-rized,and the future research directions are prospected,in order to provide assistance for the subsequent research work.
system securitytransient execution attackscache side channeldefense methodsprocessor security