This paper presents a new software side-channel attack --- enabled by the branch prediction capability common to all modern high-performance CPUs. The penalty payed (extra clock cycles) for a mispredicted branch can be used for cryptanalysis of cryptographic primitives that employ a data-dependent program flow. Analogous to the recently described cache-based side-channel attacks our attacks also allow an unprivileged process to attack other processes running in parallel on the same processor, despite sophisticated partitioning methods such as memory protection, sandboxing or even virtualization. We will discuss in detail several such attacks for the example of RSA, and experimentally show their applicability to real systems, such as...
Micro-architectural attacks on computing systems often unearth from simple artefacts in the underlyi...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
Abstract. This paper announces a new software side-channel attack — enabled by the branch prediction...
Abstract. Asymmetric-key cryptographic algorithms when implemented on systems with branch predictors...
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from so...
Abstract. Recently, Acıiçmez, Koç, and Seifert have introduced new side-channel analysis types, name...
Abstract—Performance monitors are provided in modern day computers for observing various features of...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Covert channels through shared processor resources provide secret communication between malicious pr...
In recent years, performance counters have been used as a side channel source to monitor branch misp...
International audienceIn recent years, performance counters have been used as a side channel source ...
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SB...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Micro-architectural attacks on computing systems often unearth from simple artefacts in the underlyi...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
Abstract. This paper announces a new software side-channel attack — enabled by the branch prediction...
Abstract. Asymmetric-key cryptographic algorithms when implemented on systems with branch predictors...
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from so...
Abstract. Recently, Acıiçmez, Koç, and Seifert have introduced new side-channel analysis types, name...
Abstract—Performance monitors are provided in modern day computers for observing various features of...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Covert channels through shared processor resources provide secret communication between malicious pr...
In recent years, performance counters have been used as a side channel source to monitor branch misp...
International audienceIn recent years, performance counters have been used as a side channel source ...
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SB...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Micro-architectural attacks on computing systems often unearth from simple artefacts in the underlyi...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...