J
Jean-François Gallais
Researcher at University of Luxembourg
Publications - 5
Citations - 66
Jean-François Gallais is an academic researcher from University of Luxembourg. The author has contributed to research in topics: Side channel attack & Cache. The author has an hindex of 3, co-authored 5 publications receiving 65 citations.
Papers
More filters
Book ChapterDOI
Improved trace-driven cache-collision attacks against embedded AES implementations
TL;DR: Two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES using a new known plaintext attack that can recover a 128-bit key with approximately 30 measurements to reduce the number of key hypotheses to 230.
Book ChapterDOI
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
Jean-François Gallais,Johann Großschädl,Neil Hanley,Markus Kasper,Marcel Medwed,Francesco Regazzoni,Jörn-Marc Schmidt,Stefan Tillich,Marcin Wójcik +8 more
TL;DR: A number of simple micro-architectural modifications to induce or amplify information leakage via faulty computations or variations in the latency and power consumption of certain instructions are described.
Journal ArticleDOI
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES
TL;DR: A mathematical model is constructed to estimate the maximal number of leakage rounds that can be utilized and the minimal number of cache traces required for a successful MDATDCA on AES and attests that combining TDCAs with algebraic techniques is a very efficient way to improve cache attacks.
Microarchitectural Side-Channel Attacks
TL;DR: This thesis shows that microarchitectural leakages and fault inductions can be exploited in a constructive way when induced by hardware Trojans implemented on general-purpose microprocessors and proposes different attacks against embedded software implementations of the Advanced Encryption Standard in the chosen and known-plaintext scenarios.
Posted Content
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations.
TL;DR: In this paper, the authors presented two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES, which is comparable to classical Dierential Power Analysis; however, their attacks are able to overcome certain masking techniques.