Subtopic Deep Dive

Side-Channel Attacks
Research Guide

What is Side-Channel Attacks?

Side-channel attacks exploit physical implementation characteristics like timing, power consumption, cache behavior, and faults to leak secret information from cryptographic systems.

These attacks target discrepancies in execution time, cache hits/misses, power traces, and induced faults bypassing mathematical security proofs. Key techniques include PRIME+PROBE cache attacks (Liu et al., 2015, 976 citations) and mutual information analysis for power side-channels (Gierlichs et al., 2008, 611 citations). Over 10 papers in the corpus address defenses like constant-time implementations and masking.

15
Curated Papers
3
Key Challenges

Why It Matters

Side-channel attacks compromise deployed cryptosystems in cloud environments (Hashizume et al., 2013) and industrial control systems (Stouffer et al., 2015), enabling key recovery without algorithmic breaks. Liu et al. (2015) demonstrated cross-VM RSA key extraction via last-level cache, impacting virtualized deployments. Gierlichs et al. (2008) showed power analysis breaks AES implementations, driving hardware security standards.

Key Research Challenges

Cache Side-Channel Practicality

Last-level cache attacks evade virtualization isolation, extracting keys cross-VM as in PRIME+PROBE (Liu et al., 2015, 976 citations). Measuring covert channel capacity remains noisy in multi-tenant clouds. Defenses like cache partitioning increase overhead.

Power Trace Analysis Efficiency

Mutual information analysis processes high-dimensional power traces to recover keys from masked AES (Gierlichs et al., 2008, 611 citations). Template attacks require device-specific profiling. Higher-order masking countermeasures raise attack complexity exponentially.

Controlled Channel Determinism

Untrusted OSes leak via deterministic side-channels despite isolation (Xu et al., 2015, 700 citations). Speculative execution amplifies timing leaks. Formal verification of constant-time code struggles with compiler optimizations.

Essential Papers

1.

Hyperledger fabric

Elli Androulaki, Artem Barger, Vita Bortnikov et al. · 2018 · 3.2K citations

Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). ...

2.

Guide to Industrial Control Systems (ICS) Security

Keith Stouffer, Victoria Pillitteri, Suzanne Lightman et al. · 2015 · 1.3K citations

3541 et seq., Public Law (P.L.) 113-283.NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such st...

3.

TaintDroid

William Enck, Peter Gilbert, Seungyeop Han et al. · 2014 · ACM Transactions on Computer Systems · 1.1K citations

Today’s smartphone operating systems frequently fail to provide users with visibility into how third-party applications collect and share their private data. We address these shortcomings with Tain...

4.

JFlow

Andrew C. Myers · 1999 · 1.0K citations

A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work has proposed progr...

5.

Last-Level Cache Side-Channel Attacks are Practical

Fangfei Liu, Yuval Yarom, Qian Ge et al. · 2015 · 976 citations

We present an effective implementation of the PRIME+PROBE side-channel attack against the lastlevel cache. We measure the capacity of the covert channel the attack creates and demonstrate a cross-c...

6.

An analysis of security issues for cloud computing

Keiko Hashizume, David G. Rosado, Eduardo Fernández‐Medina et al. · 2013 · Journal of Internet Services and Applications · 733 citations

Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of ris...

7.

Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems

Yuanzhong Xu, Weidong Cui, Marcus Peinado · 2015 · 700 citations

The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long line of work on excluding these operating systems from the trusted ...

Reading Guide

Foundational Papers

Read Liu et al. (2015) first for practical cache attacks (976 citations, demonstrates cross-VM RSA break); Gierlichs et al. (2008) next for power analysis foundations (611 citations, MIA method); Myers (1999) for information flow tracking context (1026 citations).

Recent Advances

Xu et al. (2015, 700 citations) on deterministic OS channels; Liu et al. (2015, 976 citations) as bridge to modern virtualization threats.

Core Methods

PRIME+PROBE (cache eviction probes); Mutual Information Analysis (power trace key guessing); dynamic taint tracking (Enck et al., 2014); constant-time programming and cache partitioning defenses.

How PapersFlow Helps You Research Side-Channel Attacks

Discover & Search

Research Agent uses searchPapers('PRIME+PROBE cache attack') to find Liu et al. (2015), then citationGraph reveals 500+ citing works on L3 defenses; exaSearch('cross-VM side-channel mitigations') uncovers cloud-specific countermeasures; findSimilarPapers expands to fault injection papers.

Analyze & Verify

Analysis Agent runs readPaperContent on Liu et al. (2015) to extract PRIME+PROBE capacity metrics, verifyResponse with CoVe cross-checks key extraction success rates against Gierlichs et al. (2008); runPythonAnalysis simulates cache hit probabilities using NumPy on trace data; GRADE scores evidence strength for power analysis claims.

Synthesize & Write

Synthesis Agent detects gaps in cross-VM defenses post-Liu et al. (2015), flags contradictions between cache partitioning overheads; Writing Agent applies latexEditText for countermeasure tables, latexSyncCitations integrates 20 papers, latexCompile generates review PDF; exportMermaid diagrams attack models vs. masking hierarchies.

Use Cases

"Simulate PRIME+PROBE cache attack success rate from Liu 2015 traces"

Research Agent → searchPapers('Liu Yarom 2015') → Analysis Agent → readPaperContent + runPythonAnalysis(NumPy simulation of 1000 probes) → matplotlib plot of key recovery probability vs. noise.

"Write LaTeX survey on power side-channel countermeasures"

Research Agent → citationGraph('Gierlichs 2008') → Synthesis → gap detection → Writing Agent → latexEditText(structured sections) → latexSyncCitations(15 refs) → latexCompile → PDF with mutual information formulas.

"Find GitHub repos implementing cache side-channel defenses"

Research Agent → searchPapers('last-level cache defenses') → Code Discovery → paperExtractUrls → paperFindGithubRepo → githubRepoInspect → list of 5 constant-time crypto forks with test coverage.

Automated Workflows

Deep Research workflow scans 50+ side-channel papers via searchPapers → citationGraph clustering → structured report ranking attacks by exploitability (Liu et al. top). DeepScan applies 7-step CoVe to verify countermeasure efficacy in Xu et al. (2015), checkpointing statistical claims. Theorizer generates formal model of PRIME+PROBE capacity from Liu et al. traces.

Frequently Asked Questions

What defines a side-channel attack?

Side-channel attacks recover secrets from physical leaks like timing, cache state, power usage, or faults, ignoring algorithmic security (Liu et al., 2015; Gierlichs et al., 2008).

What are key analysis methods?

PRIME+PROBE measures cache contention for cross-VM leaks (Liu et al., 2015, 976 citations); mutual information processes power traces non-parametrically (Gierlichs et al., 2008, 611 citations).

What are seminal papers?

Liu et al. (2015, 976 citations) proved L3 cache attacks practical; Gierlichs et al. (2008, 611 citations) introduced MIA for power analysis; Xu et al. (2015, 700 citations) exposed OS controlled channels.

What open problems exist?

Verifying constant-time at assembly level post-compilation; scaling higher-order masking to post-quantum crypto; mitigating speculative execution side-channels beyond cache partitioning.

Research Security and Verification in Computing with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching Side-Channel Attacks with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers