Eviction sets are groups of memory addresses that map to the same cache set. They can be used to perform efficient information-leaking attacks against the cache memory, so-called cache side channel attacks. In this project, two different algorithms that find such sets are implemented and compared. The second of the algorithms improves on the first by using a concept called group testing. It is also evaluated if these algorithms can be used to analyse or reverse engineer the cache characteristics, which is a new area of application for this type of algorithms. The results show that the optimised algorithm performs significantly better than the previous state-of-the-art algorithm. This means that countermeasures developed against this type of...
Abstract. Formally bounding side-channel leakage is important to bridge the gap between the theory a...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...
Eviction sets are groups of memory addresses that map to the same cache set. They can be used to per...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Open Access: https://www.mdpi.com/2076-3417/12/5/2415International audienceCache timing attacks, i.e...
Finding minimal eviction sets, sets of memory addresses of minimum size that can evict content from...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The report describes the development of several software side-channel attacks which exploit cache v...
Abstract. Formally bounding side-channel leakage is important to bridge the gap between the theory a...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...
Eviction sets are groups of memory addresses that map to the same cache set. They can be used to per...
Cache timing attacks, i.e., a class of remote side-channel attack, have become very popular in recen...
Open Access: https://www.mdpi.com/2076-3417/12/5/2415International audienceCache timing attacks, i.e...
Finding minimal eviction sets, sets of memory addresses of minimum size that can evict content from...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...
This work was funded thanks to the French national program ”Programme d’Investissement d’Avenir IRT ...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The report describes the development of several software side-channel attacks which exploit cache v...
Abstract. Formally bounding side-channel leakage is important to bridge the gap between the theory a...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...