Trace-Driven Cache Attacks on AES.
Citations
750 citations
Cites background from "Trace-Driven Cache Attacks on AES."
...However, recent work on shielding systems [10] shows that even very complex legacy applications can be protected from such Iago attacks by drastically reducing the system call interface and by carefully checking the results of system calls before returning them to application code....
[...]
...The number of invocations of decompress_onepass tells us the number of rows of blocks in the image....
[...]
500 citations
Cites methods from "Trace-Driven Cache Attacks on AES."
...Recently, variants of this attack (termed “trace-driven” in [48]) were realized by Bertoni et al. [11] and Acıiçmez and Koç [3,4], using a power side-channel of a MIPS microprocessor in an idealized simulation....
[...]
...[11] and Acıiçmez and Koç [3,4], using a power side-channel of a MIPS microprocessor in an idealized simulation....
[...]
481 citations
Cites background from "Trace-Driven Cache Attacks on AES."
...Especially, [12] proposes a model for analyzing the efficiency of trace-driven attacks against symmetric ciphers....
[...]
...On the other hand, in trace-driven attacks, an adversary is able to obtain a profile of the cache activity during an encryption, and to deduce which memory accesses issued by the cipher resulted in a cache hit [12]– [15]....
[...]
371 citations
348 citations
References
6,757 citations
3,989 citations
"Trace-Driven Cache Attacks on AES." refers background in this paper
...Implementations of cryptosystems may leak information through side channels due to the properties and physical requirements of the device, e.g., power consumption, electromagnetic emanation and/or execution time....
[...]
3,526 citations
2,140 citations
"Trace-Driven Cache Attacks on AES." refers methods in this paper
...We analyze trace-driven attacks on AES under the assumption that the adversary can capture the traces of AES encryption....
[...]
1,362 citations