Book ChapterDOI
Trace-driven cache attacks on AES (short paper)
Onur Aciicmez,Çetin Kaya Koç +1 more
- pp 112-121
Reads0
Chats0
TLDR
This paper presents an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem, and develops an accurate mathematical model that is used in the cost analysis of the attack.Abstract:
Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem. We also evaluate the cost of the proposed attack in detail under the assumption of a noiseless environment. We develop an accurate mathematical model that we use in the cost analysis of our attack. We use two different metrics, specifically, the expected number of necessary traces and the cost of the analysis phase, for the cost evaluation purposes. Each of these metrics represents the cost of a different phase of the attack.read more
Citations
More filters
Journal ArticleDOI
Efficient Cache Attacks on AES, and Countermeasures
TL;DR: An extremely strong type of attack is demonstrated, which requires knowledge of neither the specific plaintexts nor ciphertexts and works by merely monitoring the effect of the cryptographic process on the cache.
Proceedings ArticleDOI
Cache template attacks: automating attacks on inclusive last-level caches
TL;DR: An automated attack on the T-table-based AES implementation of OpenSSL that is as efficient as state-of-the-art manual cache attacks and can reduce the entropy per character from log2(26) = 4.7 to 1.4 bits on Linux systems is performed.
Proceedings ArticleDOI
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
TL;DR: Home Alone is introduced, a system that lets a tenant verify its VMs' exclusive use of a physical machine by using a side-channel in the L2 memory cache as a novel, defensive detection tool.
Book ChapterDOI
Cache-collision timing attacks against AES
Joseph Bonneau,Ilya Mironov +1 more
TL;DR: The most powerful attack has been shown under optimal conditions to reliably recover a full 128-bit AES key with 213 timing samples, an improvement of almost four orders of magnitude over the best previously published attacks of this type.
Journal ArticleDOI
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
TL;DR: This work surveys recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud computing, and classify types of attacks according to a taxonomy of the shared resources leveraged for such attacks.
References
More filters
Journal ArticleDOI
Side channel cryptanalysis of product ciphers
TL;DR: This work demonstrates side-channel attacks against three product ciphers - timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES - and generalizes the research to other cryptosystems.
Book ChapterDOI
Cryptanalysis of DES Implemented on Computers with Cache
TL;DR: The results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay as proposed in (11), found that the cipher can be broken with 2 known plaintexts and 2 24 calculations at a success rate > 90%, using a personal computer with 600-MHz Pentium III.
Posted Content
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel.
TL;DR: In this article, the idea of cache memory being used as a side-channel which leaks information during the run of a cryptographic algorithm has been investigated, and it has been shown that an attacker may be able to reveal or narrow the possible values of secret information held on the target device.
Book ChapterDOI
Advances on access-driven cache attacks on AES
Michael Neve,Jean-Pierre Seifert +1 more
TL;DR: This work shows that access-driven cache-based attacks are becoming easier to understand and analyze, and when such attacks are mounted against systems performing AES, only a very limited number of encryptions are required to recover the whole key with a high probability of success.
Book ChapterDOI
Cache based remote timing attack on the AES
TL;DR: A new robust cache-based timing attack on AES that can be used to obtain secret keys of remote cryptosystems if the server under attack runs on a multitasking or simultaneous multithreading system with a large enough workload.