Cache-Timing Attacks and Shared Contexts

Billy Bob Brumley, Nicola Tuveri

Research output: Other conference contributionAbstractScientific

66 Downloads (Pure)

Abstract

Cache-timing attacks recover algorithm state by exploiting the fact that the latency of retrieving data from memory is essentially governed by the availability of said data in the processor’s cache. Efficient and effective countermeasures to these attacks are needed. A shared memory context is a mechanism for reusing dynamically allocated memory. Focusing on public key cryptography within OpenSSL and its implementation of shared contexts, this paper examines the ability of a shared context to aid in mitigation of cache-timing attacks. The results are pessimistic towards this approach.
Original languageEnglish
Pages233-242
Number of pages10
DOIs
Publication statusPublished - Feb 2011
Externally publishedYes
Publication typeNot Eligible
EventCOSADE 2011: Second International Workshop on Constructive Side-Channel Analysis and Secure Design - Darmstadt, Germany
Duration: 24 Feb 201125 Feb 2011
Conference number: 2
http://cosade2011.cased.de/index.html

Workshop

WorkshopCOSADE 2011
Abbreviated titleCOSADE 2011
Country/TerritoryGermany
CityDarmstadt
Period24/02/1125/02/11
Internet address

Keywords

  • cache-timing attacks
  • side-channel attacks
  • countermeasures
  • memory allocation

Fingerprint

Dive into the research topics of 'Cache-Timing Attacks and Shared Contexts'. Together they form a unique fingerprint.

Cite this