Cache attacks and Countermeasures: the Case of AES

  title={Cache attacks and Countermeasures: the Case of AES},
  author={Dag Arne Osvik and Adi Shamir and Eran Tromer},
  journal={IACR Cryptology ePrint Archive},
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups. The attacks allow an unprivileged process to attack other processes running in parallel on the same processor, despite partitioning methods such as memory protection, sandboxing and virtualization. Some of our methods… CONTINUE READING
Highly Influential
This paper has highly influenced 118 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 849 citations. REVIEW CITATIONS
549 Citations
15 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 549 extracted citations

850 Citations

Citations per Year
Semantic Scholar estimates that this publication has 850 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 15 references

Device for and method of secure computing using virtual machines

  • Robert V. Meushaw, Mark S. Schneider, Donald N. Simard, Grant M. Wagner
  • US patent 6,922,774,
  • 2005
1 Excerpt

An Infrastructure for Efficiently protecting information leakage on the address bus , proc

  • Xiaotong Zhuang, Tao Zhang, HIDE Santosh Pande
  • Architectural Support for Programming Languages…
  • 2004

A timing attack against Rijndael, technical report CG-1999/1

  • François Koeune, Jean-Jacques Quisquater
  • Université catholique de Louvain,
  • 1999
2 Excerpts

Similar Papers

Loading similar papers…