Abstract
Cache-timing attacks recover algorithm state by exploiting the fact that the latency of retrieving data from memory is essentially governed by the availability of said data in the processor’s cache. Efficient and effective countermeasures to these attacks are needed. A shared memory context is a mechanism for reusing dynamically allocated memory. Focusing on public key cryptography within OpenSSL and its implementation of shared contexts, this paper examines the ability of a shared context to aid in mitigation of cache-timing attacks. The results are pessimistic towards this approach.
Original language | English |
---|---|
Pages | 233-242 |
Number of pages | 10 |
DOIs | |
Publication status | Published - Feb 2011 |
Externally published | Yes |
Publication type | Not Eligible |
Event | COSADE 2011: Second International Workshop on Constructive Side-Channel Analysis and Secure Design - Darmstadt, Germany Duration: 24 Feb 2011 → 25 Feb 2011 Conference number: 2 http://cosade2011.cased.de/index.html |
Workshop
Workshop | COSADE 2011 |
---|---|
Abbreviated title | COSADE 2011 |
Country/Territory | Germany |
City | Darmstadt |
Period | 24/02/11 → 25/02/11 |
Internet address |
Keywords
- cache-timing attacks
- side-channel attacks
- countermeasures
- memory allocation