Introducing The ‘Unified Side Channel Attack - Model’ (USCA-M)

Richard Ward, Andrew Johnson

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


    This paper presents a ‘Unified Side Channel Attack Model’ (USCA-M). The USCA-M model is compiled by the research undertaken of side-channel attacks (SCAs) from published journal articles and conference papers between 2015-2019. The research found that SCAs can be categorised into three main areas: SCA types, SCA methods and SCA techniques. By using this categorisation as a foundation, the USCA-M was compiled. USCA-M has three main contributions to the research field:1.A unified model that can categorize present and future SCA vulnerabilities and exploit techniques found.2.A reference point for organisations to be able to identify and place a found SCA within a common or unified categorisation.3.The decomposition of SCA methods and techniques into identifiable components to assist in the defence of SCAs, such as code pattern recognition.
    Original languageEnglish
    Title of host publication2020 8th International Symposium on Digital Forensics and Security (ISDFS)
    EditorsAsaf Varol, Murat Karabatak, Cihan Varol, Songul Karabatak
    PublisherInstitute of Electrical and Electronics Engineers
    ISBN (Electronic)9781728169392
    Publication statusPublished - 15 Jun 2020
    Event8th International Symposium on Digital Forensics and Security (2020) - Beirut, Lebanon
    Duration: 1 Jun 20202 Jun 2020
    Conference number: 8

    Publication series

    Name8th International Symposium on Digital Forensics and Security, ISDFS 2020


    Conference8th International Symposium on Digital Forensics and Security (2020)
    Abbreviated titleISDFS 2020
    Internet address


    • Side-channel attacks
    • Model
    • Spectre
    • Meltdown
    • RIDL
    • speculative execution
    • branch prediction


    Dive into the research topics of 'Introducing The ‘Unified Side Channel Attack - Model’ (USCA-M)'. Together they form a unique fingerprint.

    Cite this