In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of a class of cache-based side-channel attacks. The methodology provides estimates on the lower bound of the required number of observations on the side channel and the number of trials for a successful attack. As a case study, a weak implementation of the Advanced Encryption Standard algorithm is selected to apply the proposed methodology to three different categories of cache-based attacks; namely, access-driven, trace-driven and time-driven attacks. The approach, however, is generic in the sense that it can be utilized in other algorithms that are subject to the micro-architectural side-channel attacks. The adopted approach bases its analysi...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...
Cache based side-channel attacks have recently been attracted significant attention due to the new d...
Leakage of information between two processes sharing the same processor cache has been exploited in ...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Abstract. Formal models that allow one to understand side-channel attacks and are also directly mean...
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long stand...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The report describes the development of several software side-channel attacks which exploit cache v...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
We argue that five recent software and hardware developments — the AES-NI instructions, multicore pr...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...
Cache based side-channel attacks have recently been attracted significant attention due to the new d...
Leakage of information between two processes sharing the same processor cache has been exploited in ...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Abstract. Formal models that allow one to understand side-channel attacks and are also directly mean...
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long stand...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The report describes the development of several software side-channel attacks which exploit cache v...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
We argue that five recent software and hardware developments — the AES-NI instructions, multicore pr...
Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real t...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...