CacheD: Identifying Cache-Based Timing Channels in Production Software

@inproceedings{Wang2017CacheDIC,
  title={CacheD: Identifying Cache-Based Timing Channels in Production Software},
  author={Shuai Wang and Pei Wang and Xiao Liu and Danfeng Zhang and Dinghao Wu},
  booktitle={USENIX Security Symposium},
  year={2017}
}
Side-channel attacks recover secret information by analyzing the physical implementation of cryptosystems based on non-functional computational characteristics, e.g. time, power, and memory usage. Among all wellknown side channels, cache-based timing channels are notoriously severe, leading to practical attacks against certain implementations of theoretically secure crypto algorithms, such as RSA, ElGamal and AES. Such attacks target the hierarchical design of the modern computer memory system… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 22 CITATIONS

Adversarial symbolic execution for detecting concurrency-related cache timing leaks

  • ESEC/SIGSOFT FSE
  • 2018
VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

  • USENIX Security Symposium
  • 2018
VIEW 7 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Analysis of Secure Caches and Timing-Based Side-Channel Attacks

  • IACR Cryptology ePrint Archive
  • 2019
VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 60 REFERENCES

Last-Level Cache Side-Channel Attacks are Practical

  • 2015 IEEE Symposium on Security and Privacy
  • 2015
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Cross-VM side channels and their use to extract private keys

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice

  • 2011 IEEE Symposium on Security and Privacy
  • 2010
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Efficient Cache Attacks on AES, and Countermeasures

  • Journal of Cryptology
  • 2009
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Cache attacks and Countermeasures: the Case of AES

  • IACR Cryptology ePrint Archive
  • 2005
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Remote Timing Attacks Are Practical

  • USENIX Security Symposium
  • 2003
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL