There are two flavours of attack:
- Horizontal SCA that exploits leakage during a single algorithm execution
- Vertical SCA that exploits leakage from multiple executions
Notes related to Side Channel
Differential Power Analysis, Language based security, Security
Papers related to Side Channel
- Hardware is the new software [baumann:hotos:2017]
- SoK: Design tools for side-channel-aware implementations [buhan:ccs:2022]
- A survey of microarchitectural timing attacks and countermeasures on contemporary hardware [ge:jce:2016]
- Solver-aided constant-time hardware verification [gleissenthall:ccs:2021]
- InSpectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis [guanciale:ccs:2020]
- Spectector: Principled detection of speculative information flows [guarnieri:sandp:2020]
- Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors [kim:isca:2014]
- Spectre attacks: Exploiting speculative execution [kocher:arxiv:2018]
- Differential power analysis [kocher:crypto:1999]
- Meltdown [lipp:arxiv:2018]
- TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks [martin:isca:2012]
- Spectre is here to stay: An analysis of side-channels and speculative execution [mcilroy:arxiv:2019]
- Axiomatic hardware-software contracts for security [mosier:isca:2022]
- Flip Feng Shui: Hammering a needle in the software stack [razavi:usenix:2016]
- Zero-overhead path prediction with progressive symbolic execution [rutledge:icse:2019]
- CLKSCREW: Exposing the perils of security-oblivious energy management [tang:sec:2017]
- Opening Pandora's box: A systematic study of new ways microarchitecture can leak private data [vicarte:isca:2021]
- CacheQuery: Learning replacement policies from hardware caches [vila:pldi:2020]