New Results On Instruction Cache Attacks

CHES'10: Proceedings of the 12th international conference on Cryptographic hardware and embedded systems(2010)

引用 127|浏览33
暂无评分
摘要
We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.
更多
查看译文
关键词
I-cache attack,Previous I-cache attack,live I-cache timing data,actual attack,analysis technique,efficient automated attack,instruction cache data analysis,present general software countermeasures,present result,DSA implementation,instruction cache attack,new result
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要