Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop computers. Recently, also investigations of such attacks on testbeds with processors that are employed in mobile devices have been done. In this work we investigate the applicability of Bernstein\u27s timing attack and the cache-collision attack by Bogdanov et al. in real environments on three state-of-the-art mobile devices. These devices are: an Acer Iconia A510, a Google Nexus S, and a Samsung Galaxy SIII. We show that T-table based implementations of the Advanced Encryption Standard (AES) leak enough timing information on these devices in order to recover parts of the used secret key using Bernstein\u27s timing attack. We also show that ...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). G...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
In this paper we present two attacks that exploit cache events, which are visible in some side chann...
Nowadays, in order to provide secure, reliable and performant services (e.g: mobile payments, agenda...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). G...
Software implementations of block ciphers are widely used to perform critical operations such as dis...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Abstract. This paper describes several novel timing attacks against the common table-driven software...
In this paper we present two attacks that exploit cache events, which are visible in some side chann...
Nowadays, in order to provide secure, reliable and performant services (e.g: mobile payments, agenda...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern pr...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). G...
Software implementations of block ciphers are widely used to perform critical operations such as dis...