CVE-2020-12399: research data and tooling

Dataset

Description

This dataset and software tools are for reproducing the research results related to CVE-2020-12399, resulting from the manuscript "Déjà vu: Side-channel analysis of Mozilla's NSS", to appear at ACM CCS 2020.

- The data is from a remote timing attack against the NSS v3.51 implementation of DSA signing.
- The client machine was a 3.1 GHz 64-bit Intel i5-2400 CPU (Sandy Bridge).
- The server machine was a Raspberry Pi 3 Model B plus board containing a 1.4 GHz 64-bit quad-core Cortex-A53 processor.
- The client and server were connected by a Cisco 9300 series enterprise switch over Gbit Ethernet.
- The data contains pow(2,18) samples.
- The data was used to produce Figure 1 in the paper and contains all the remote timing attack data from Section 4.
Date made available13 Aug 2020
PublisherZenodo

Field of science, Statistics Finland

  • 213 Electronic, automation and communications engineering, electronics
  • Déjà Vu: Side-Channel Analysis of Mozilla's NSS

    Hassan, S. U., Gridin, I., Delgado-Lozano, I. M., García, C. P., Chi-Domínguez, J. J., Aldaya, A. C. & Brumley, B. B., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1887-1902 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    113 Downloads (Pure)

Cite this