Android smartphones collect and compile a huge amount of sensitive information which is secured using cryptography. There is an unintended leakage of information during the physical implementation of a cryptosystem on a device. Such a leakage is often termed as side channel and is used to break the implementation of cryptographic algorithms. In this work, we utilize cache memory based side channels on android smartphones to retrieve crypto-process information. These side channels are based on the information leakage through the operating system, micro-architecture of the processor and the state of the processor's memory cache. We demonstrate the retrieval of data dependent memory access patterns using a spy application running in the backgr...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
© 2018 Private breach has always been an important threat to mobile security. Recent studies show th...
© 2018 IEEE. Private breach has always been an important threat to mobile security. Recent studies s...
Privacy protection is an essential part of information security. The use of shared resources demands...
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
© 2018 Private breach has always been an important threat to mobile security. Recent studies show th...
© 2018 IEEE. Private breach has always been an important threat to mobile security. Recent studies s...
Privacy protection is an essential part of information security. The use of shared resources demands...
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
CPU micro-architectural side-channels, or CPU side-channels in short, have gained plenty of attentio...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...