Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (7): 2070-2078.DOI: 10.11772/j.issn.1001-9081.2024070933

• The 39th CCF National Conference of Computer Applications (CCF NCCA 2024) • Previous Articles     Next Articles

Review of conflict-based cache side-channel attacks and eviction sets

Zihao YAO1,2, Ziqiang MA1,2,3(), Yang LI1,2, Lianggen WEI1,2   

  1. 1.School of Information Engineering,Ningxia University,Yinchuan Ningxia 750021,China
    2.Collaborative Innovation Center for Ningxia Big Data and Artificial Intelligence Co-founded by Ningxia Municipality and Ministry of Education (Ningxia University),Yinchuan Ningxia 750021,China
    3.Ningxia Key Laboratory of Artificial Intelligence and Information Security for Channeling Computing Resources from the East to the West (Ningxia University),Yinchuan Ningxia 750021,China
  • Received:2024-07-05 Revised:2024-09-05 Accepted:2024-09-25 Online:2025-07-10 Published:2025-07-10
  • Contact: Ziqiang MA
  • About author:YAO Zihao, born in 1999, M. S. candidate. His research interests include computer system security, cache side-channel attack, eviction set construction algorithm.
    MA Ziqiang, born in 1990, Ph. D., associate professor. His research interests include computer system security, network traffic identification and analysis, network public opinion analysis, blockchain application security.
    LI Yang, born in 1999, M. S. candidate. His research interests include computer system security, cache side-channel attack and defense, transient attack.
    WEI Lianggen, born in 1997, M. S. candidate. His research interests include computer system security, lattice attack, lattice cryptography.
  • Supported by:
    Talent Introduction Project of Ningxia Hui Autonomous Region Key Research and Development Program(2021BEB04047)

基于冲突的缓存侧信道攻击与驱逐集综述

姚梓豪1,2, 马自强1,2,3(), 李扬1,2, 魏良根1,2   

  1. 1.宁夏大学 信息工程学院,银川 750021
    2.宁夏大数据与人工智能省部共建协同创新中心(宁夏大学),银川 750021
    3.宁夏“东数西算”人工智能与信息安全重点实验室(宁夏大学),银川 750021
  • 通讯作者: 马自强
  • 作者简介:姚梓豪(1999—),男,安徽阜阳人,硕士研究生,主要研究方向:计算机系统安全、缓存侧信道攻击、驱逐集构造算法
    马自强(1990—),男,新疆乌鲁木齐人,副教授,博士,CCF会员,主要研究方向:计算机系统安全、网络流量识别分析、网络舆情分析、区块链应用安全 maziqiang@nxu.edu.cn
    李扬(1999—),男,江西上饶人,硕士研究生,主要研究方向:计算机系统安全、缓存侧信道攻击与防御、瞬态攻击
    魏良根(1997—),男,四川成都人,硕士研究生,主要研究方向:计算机系统安全、格攻击、格密码。
  • 基金资助:
    宁夏回族自治区重点研发计划引才专项(2021BEB04047)

Abstract:

Cache side-channel attacks exploit the shared characteristics of computer caches, and pose serious threats to target cryptographic systems across processors and virtual machines. Among them, conflict-based cache side-channel attacks overcome the limitations imposed of privileged instructions, and can construct a set of virtual addresses that map to the same cache set as the target address, that is the eviction set, so as to cause cache conflicts and ultimately obtain the target’s sensitive data. Constructing eviction set has become a key technique in conflict-based cache side-channel attacks and speculative execution attacks. Therefore, a review of researches on conflict-based cache side-channel attacks and eviction sets was conducted. First, the fundamental principles of conflict-based cache side-channel attacks were discussed. Subsequently,the core mechanisms and evolution of eviction set construction algorithms were discussed. These algorithms were systematically categorized into conflict elimination methods and conflict progressive methods, distinguished by their strategies for candidate address manipulation and eviction set construction. Furthermore, key factors influencing eviction set construction algorithms were summarized. Finally,current challenges and future research directions for conflict-based cache side-channel attacks were discussed.

Key words: system security, cache side-channel attack, eviction set, virtual address, cache replacement policy

摘要:

缓存侧信道攻击是一种利用计算机缓存共享特性的侧信道攻击手段,对跨处理器、跨虚拟机的目标密码系统构成严重威胁。其中基于冲突的缓存侧信道攻击突破了使用特权指令的限制,能构造一组与目标地址映射到同一缓存集的虚拟地址,即驱逐集,从而造成缓存冲突,进而最终获取目标的隐私数据。构造驱逐集已成为基于冲突的缓存侧信道攻击和推测执行攻击的关键技术之一。因此,对基于冲突的缓存侧信道攻击与驱逐集的研究进行综述。首先,剖析了基于冲突的缓存侧信道攻击的基本原理;其次,分析了驱逐集构造算法的基本原理、发展现状,根据候选地址的操作策略和驱逐集的构造策略不同,将算法分为冲突移除法和冲突渐增法两类;再次,对驱逐集构造算法的影响因素进行了归纳;最后,讨论了基于冲突的缓存侧信道攻击的现状及未来的研究方向。

关键词: 系统安全, 缓存侧信道攻击, 驱逐集, 虚拟地址, 缓存替换策略

CLC Number: