Review Article

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Table 2

Research studies on cache-based side-channel attacks.

AttacksPatternsCache typesRangeTarget

[14]Prime + ProbeL1-DCoreOpenSSL(0.9.7c) RSA
[2]Prime + ProbeL1-DCoreAES
[5, 23]Prime + ProbeL1-DCoreOpenSSL(0.9.8) AES
[21]Prime + ProbeL1-ICoreOpenSSL(0.9.8d) RSA
[6]Prime + ProbeL1-ICoreOpenSSL(0.9.8e) RSA
[8]Evict +timeLLCCPUKernel memory
[20]Flush + ReloadLLCCPUOpenSSL(0.9.8n) AES
[30]Flush + ReloadLLCCPUGnuPG(1.4.13) RSA
[4]Flush + ReloadLLCCPU/VMOpenSSL(1.0.1f) AES
[3134]Flush + ReloadLLCCPUOpenSSL(1.0.1e) ECDSA
[9]Flush + ReloadLLCCPU/VMUser activities
[35]Flush + ReloadLLCCPUTLS andDTLS
[36]Flush + ReloadLLCCPUKeyboard input
[37]Prime + ProbeLLCCPUGnuPG(1.4.13/1.4.18) ElGamal
[22]Flush + ReloadLLCCPUOpenSSL DSA
[38]Prime + ProbeLLCCPUAES
[39]Flush + FlushLLCCoreAES T-table
[16]Invalidate + TransferSystemOpen SSL AES/libgcrypt ElGamal
[12, 13, 17]Flush + reload/evict + timeLLCCPUMemory isolation
[40, 41]Prime + ProbeLLCCPU/enclaveRSA