TY - GEN
T1 - New results on instruction cache attacks
AU - AcIiçmez, Onur
AU - Brumley, Billy Bob
AU - Grabher, Philipp
PY - 2010/11/5
Y1 - 2010/11/5
N2 - We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.
AB - We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.
U2 - 10.1007/978-3-642-15031-9_8
DO - 10.1007/978-3-642-15031-9_8
M3 - Conference contribution
AN - SCOPUS:78049348331
SN - 3642150306
SN - 9783642150302
T3 - Lecture Notes in Computer Science
SP - 110
EP - 124
BT - Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings
T2 - 12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010
Y2 - 17 August 2010 through 20 August 2010
ER -