Cache Attacks and Countermeasures: The Case of AES

@article{Osvik2005CacheAA,
  title={Cache Attacks and Countermeasures: The Case of AES},
  author={Dag Arne Osvik and A. Shamir and Eran Tromer},
  journal={IACR Cryptol. ePrint Arch.},
  year={2005},
  volume={2005},
  pages={271}
}
  • Dag Arne Osvik, A. Shamir, Eran Tromer
  • Published 2005
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. [...] Key Method Some of our methods require only the ability to trigger services that perform encryption or MAC using the unknown key, such as encrypted disk partitions or secure network links. Moreover, we demonstrate an extremely strong type of attack, which requires knowledge of neither the specific plaintexts nor ciphertexts, and works by merely monitoring the effect of the…Expand Abstract
    1,054 Citations
    Efficient Cache Attacks on AES, and Countermeasures
    • 367
    • PDF
    Challenges in Implementing Cache-Based Side Channel Attacks on Modern Processors
    • 2
    Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice
    • 398
    • PDF
    Cache Attacks on Intel SGX
    • 185
    • PDF
    Predicting Secret Keys Via Branch Prediction
    • 261
    • PDF
    Cross-VM Cache Attacks on AES
    • 12
    • PDF

    References

    SHOWING 1-10 OF 25 REFERENCES
    Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
    • D. Page
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2002
    • 274
    • PDF
    CACHE MISSING FOR FUN AND PROFIT
    • 575
    • PDF
    Side Channel Cryptanalysis of Product Ciphers
    • 202
    • PDF
    An ASIC Implementation of the AES SBoxes
    • 324
    Software protection and simulation on oblivious RAMs
    • 1,369
    • PDF