New results on instruction cache attacks

Onur AcIiçmez, Billy Bob Brumley, Philipp Grabher

Tutkimustuotos: KonferenssiartikkeliScientificvertaisarvioitu

83 Sitaatiot (Scopus)

Abstrakti

We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.

AlkuperäiskieliEnglanti
OtsikkoCryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings
Sivut110-124
Sivumäärä15
DOI - pysyväislinkit
TilaJulkaistu - 5 marrask. 2010
Julkaistu ulkoisestiKyllä
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisussa
Tapahtuma12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010 - Santa Barbara, CA, Yhdysvallat
Kesto: 17 elok. 201020 elok. 2010

Julkaisusarja

NimiLecture Notes in Computer Science
Vuosikerta6225
ISSN (painettu)0302-9743
ISSN (elektroninen)1611-3349

Conference

Conference12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010
Maa/AlueYhdysvallat
KaupunkiSanta Barbara, CA
Ajanjakso17/08/1020/08/10

!!ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Sormenjälki

Sukella tutkimusaiheisiin 'New results on instruction cache attacks'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä