计算机工程与应用 ›› 2025, Vol. 61 ›› Issue (2): 37-58.DOI: 10.3778/j.issn.1002-8331.2407-0066

• 热点与综述 • 上一篇    下一篇

瞬态执行攻击防御方法研究进展

李扬,高菲,马自强,苗莉   

  1. 1.宁夏大学 信息工程学院,银川 750021
    2.宁夏“东数西算”人工智能与信息安全重点实验室,银川 750021
    3.宁夏大数据与人工智能省部共建协同创新中心,银川 750021
  • 出版日期:2025-01-15 发布日期:2025-01-15

Research Progress in Transient Execution Attack Defense Technologies

LI Yang, GAO Fei, MA Ziqiang, MIAO Li   

  1. 1.School of Information Engineering, Ningxia University, Yinchuan 750021, China
    2.Ningxia Key Laboratory of Artificial Intelligence and Information Security for Channeling Computing Resources from the East to the West, Yinchuan 750021, China
    3.Collaborative Innovation Center for Ningxia Big Data and Artificial Intelligence Co-Founded by Ningxia Municipality and Ministry of Education, Yinchuan 750021, China
  • Online:2025-01-15 Published:2025-01-15

摘要: 瞬态执行攻击利用处理器微架构的实现特性窃取秘密,并通过缓存侧信道泄露秘密相关信息,对现代商用处理器的信息安全构成了极大威胁。随着攻击研究的不断深入,其防御方法也成为了研究热点。对瞬态执行攻击防御技术发展现状进行了系统性总结,剖析了熔断型攻击、幽灵型攻击、数据采样型攻击和缓存隐蔽信道的形成原因及分类依据;总结了防御方法的实现原理与发展现状,依据防御措施的介入阶段将其分为四类:基于代码检测的、基于破坏瞬态行为的、基于中断隐蔽信道的和面向攻击检测的防御方法,其中,特别总结了结合机器学习的攻击检测方法。对现有防御研究中存在的关键问题进行了分析与总结,并展望了未来的研究方向,以期为后续研究工作提供帮助。

关键词: 系统安全, 瞬态执行攻击, 缓存侧信道, 防御方法, 处理器安全

Abstract: Transient execution attack (TEA) exploits the implementation characteristics of the central processor microarchitecture to steal secrets, and leak secret-related information through cache side channels, thereby posing a great threat to the information security of modern commercial processors. With the continuous deepening of attack research, its defense methods have also become a research hotspot. This paper systematically summarizes the development status of TEA defense technologies, and analyzes the underlying causes and classification criteria of meltdown-type attack, spectre-type attack, and microarchitecture data sampling (MDS) type attack and cache convert channels. Subsequently, the implementation principles and development status of defense methods are summarized, and they are classified into four categories based on the intervention stage of defense measures:code detection based, transient behavior destruction based, interrupt covert channel-based, and attack detection-oriented defense methods, specifically the attack detection method combined with machine learning is summarized. Finally, the key issues existing in the existing research work are analyzed and summarized, and the future research directions are prospected, in order to provide assistance for the subsequent research work.

Key words: system security, transient execution attacks, cache side channel, defense methods, processor security