New results on instruction cache attacks

Onur AcIiçmez, Billy Bob Brumley, Philipp Grabher

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

83 Citations (Scopus)

Abstract

We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.

Original languageEnglish
Title of host publicationCryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings
Pages110-124
Number of pages15
DOIs
Publication statusPublished - 5 Nov 2010
Externally publishedYes
Publication typeA4 Article in conference proceedings
Event12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010 - Santa Barbara, CA, United States
Duration: 17 Aug 201020 Aug 2010

Publication series

NameLecture Notes in Computer Science
Volume6225
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010
Country/TerritoryUnited States
CitySanta Barbara, CA
Period17/08/1020/08/10

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'New results on instruction cache attacks'. Together they form a unique fingerprint.

Cite this