We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the s2n library, recently released by AWS Labs. This bug ( now fixed) allowed bypassing the balancing countermeasures against timing attacks deployed in the implementation of the MAC-then-Encode-then-CBC-Encrypt (MEE-CBC) component, creating a timing side-channel similar to that exploited by Lucky 13.Although such an attack could only be launched when the MEE-CBC component is used in isolation - Albrecht and Paterson recently confirmed in independent work that s2n's second line of defence, once reinforced, provides adequate mitigati...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Trusted execution environments (TEEs) provide an environment for running workloads in the cloud with...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...
We provide further evidence that implementing software countermeasures against timing attacks is a n...
International audienceSoftware-based countermeasures provide effective mitigation against side-chann...
Software-based countermeasures provide effective mitigation against side-channel attacks, often with...
As side-channel attacks reached general purpose PCs and started to be more practical for attackers t...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
International audienceTiming attacks are among the most devastating side-channel attacks, allowing r...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
We take advantage of a recently published open source implementation of the AES protected with a mix...
peer reviewedTo guarantee the security of a cryptographic implementation against Side Channel Attack...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Trusted execution environments (TEEs) provide an environment for running workloads in the cloud with...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...
We provide further evidence that implementing software countermeasures against timing attacks is a n...
International audienceSoftware-based countermeasures provide effective mitigation against side-chann...
Software-based countermeasures provide effective mitigation against side-channel attacks, often with...
As side-channel attacks reached general purpose PCs and started to be more practical for attackers t...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
International audienceTiming attacks are among the most devastating side-channel attacks, allowing r...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
We take advantage of a recently published open source implementation of the AES protected with a mix...
peer reviewedTo guarantee the security of a cryptographic implementation against Side Channel Attack...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Trusted execution environments (TEEs) provide an environment for running workloads in the cloud with...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...