计算机工程与应用2025,Vol.61Issue(2):37-58,22.DOI:10.3778/j.issn.1002-8331.2407-0066
瞬态执行攻击防御方法研究进展
Research Progress in Transient Execution Attack Defense Technologies
摘要
Abstract
Transient execution attack(TEA)exploits the implementation characteristics of the central processor microar-chitecture to steal secrets,and leak secret-related information through cache side channels,thereby posing a great threat to the information security of modern commercial processors.With the continuous deepening of attack research,its defense methods have also become a research hotspot.This paper systematically summarizes the development status of TEA defense technologies,and analyzes the underlying causes and classification criteria of meltdown-type attack,spectre-type attack,and microarchitecture data sampling(MDS)type attack and cache convert channels.Subsequently,the implementation principles and development status of defense methods are summarized,and they are classified into four categories based on the intervention stage of defense measures:code detection based,transient behavior destruction based,interrupt covert channel-based,and attack detection-oriented defense methods,specifically the attack detection method combined with machine learning is summarized.Finally,the key issues existing in the existing research work are analyzed and summa-rized,and the future research directions are prospected,in order to provide assistance for the subsequent research work.关键词
系统安全/瞬态执行攻击/缓存侧信道/防御方法/处理器安全Key words
system security/transient execution attacks/cache side channel/defense methods/processor security分类
信息技术与安全科学引用本文复制引用
李扬,高菲,马自强,苗莉..瞬态执行攻击防御方法研究进展[J].计算机工程与应用,2025,61(2):37-58,22.基金项目
宁夏自然科学基金(2021AAC03078) (2021AAC03078)
宁夏回族自治区重点研发计划(2021BEB04004,2021BEB04047,2022BDE03008) (2021BEB04004,2021BEB04047,2022BDE03008)
宁夏大学研究生科技创新项目基金(CXXM2023-20). (CXXM2023-20)