Book ChapterDOI
Trace-driven cache attacks on AES (short paper)
Onur Aciicmez,Çetin Kaya Koç +1 more
- pp 112-121
Reads0
Chats0
TLDR
This paper presents an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem, and develops an accurate mathematical model that is used in the cost analysis of the attack.Abstract:
Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem. We also evaluate the cost of the proposed attack in detail under the assumption of a noiseless environment. We develop an accurate mathematical model that we use in the cost analysis of our attack. We use two different metrics, specifically, the expected number of necessary traces and the cost of the analysis phase, for the cost evaluation purposes. Each of these metrics represents the cost of a different phase of the attack.read more
Citations
More filters
Proceedings ArticleDOI
Towards trace-driven cache attacks on Systems-on-Chips — exploiting bus communication
TL;DR: The results illustrate that trace-driven attacks based on bus communication are a non-negligible threat in SoC environments and show that the protection techniques are feasible to implement and that they are able to mitigate the attacks.
Proceedings ArticleDOI
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks
TL;DR: Side-channel and fault attacks are surveyed, which are two powerful methods that have been demonstrated to render many implementations effectively broken and possible countermeasures will also be discussed.
Dissertation
Secure data service outsourcing with untrusted cloud
Danfeng Yao,Huijun Xiong +1 more
TL;DR: This dissertation introduces service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers and designs and realizes CloudSafe, a framework that supports secure and efficient data processing with minimum key leakage in the vulnerable cloud virtualization environment.
System Architectures to Improve Trust, Integrity and Resilience of Embedded Systems
TL;DR: This thesis elaborates a light-weight virtualization approach based on microkernel frameworks that integrates trusted computing approaches and proposes a secure loading procedure for a trusted environment to provide a flexible security architecture.
Posted Content
iTimed: Cache Attacks on the Apple A10 Fusion SoC.
References
More filters
Book ChapterDOI
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
BookDOI
The Design of Rijndael
Joan Daemen,Vincent Rijmen +1 more
TL;DR: This volume is the authoritative guide to the Rijndael algorithm and AES and professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
Book ChapterDOI
Cache attacks and countermeasures: the case of AES
TL;DR: In this article, the authors describe side-channel attacks based on inter-process leakage through the state of the CPU's memory cache, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups.
Proceedings Article
Remote timing attacks are practical
David Brumley,Dan Boneh +1 more
TL;DR: This work devise a timing attack against OpenSSL that can extract private keys from an OpenSSL-based web server running on a machine in the local network.
Book ChapterDOI
Cache-collision timing attacks against AES
Joseph Bonneau,Ilya Mironov +1 more
TL;DR: The most powerful attack has been shown under optimal conditions to reliably recover a full 128-bit AES key with 213 timing samples, an improvement of almost four orders of magnitude over the best previously published attacks of this type.