Abstract. We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL’s DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Recent work on cache attacks has shown that CPU caches represent a powerful source of information le...
Abstract. The previous I-cache timing attacks on RSA which exploit the in-struction path of a cipher...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SB...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
This thesis explores the challenges of implementing an instruction cache side-channel attack on an A...
Abstract. Recently, Acıiçmez, Koç, and Seifert have introduced new side-channel analysis types, name...
Lecture Notes in Computer Science, vol. 9813The scatter-gather technique is a commonly implemented a...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Side-channel information is any type of information leaked through unexpected channels due to physic...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Recent work on cache attacks has shown that CPU caches represent a powerful source of information le...
Abstract. The previous I-cache timing attacks on RSA which exploit the in-struction path of a cipher...
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis,...
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SB...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
This thesis explores the challenges of implementing an instruction cache side-channel attack on an A...
Abstract. Recently, Acıiçmez, Koç, and Seifert have introduced new side-channel analysis types, name...
Lecture Notes in Computer Science, vol. 9813The scatter-gather technique is a commonly implemented a...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Side-channel information is any type of information leaked through unexpected channels due to physic...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Recent work on cache attacks has shown that CPU caches represent a powerful source of information le...