Corpus ID: 221112249

D\'{e}j\`{a} Vu: Side-Channel Analysis of Mozilla's NSS

@article{Hassan2020DejaVS,
  title={D\'\{e\}j\`\{a\} Vu: Side-Channel Analysis of Mozilla's NSS},
  author={Sohaib ul Hassan and I. Gridin and I. M. Delgado-Lozano and Cesar Pereida Garc'ia and Jes'us-Javier Chi-Dom'inguez and Alejandro Cabrera Aldaya and B. Brumley},
  journal={arXiv: Cryptography and Security},
  year={2020}
}
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not done directly to them. In this work, we present another instance of this issue by performing the… Expand

References

SHOWING 1-10 OF 62 REFERENCES
Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and DSA
  • Keegan Ryan
  • Computer Science
  • IACR Trans. Cryptogr. Hardw. Embed. Syst.
  • 2019
Single Trace Attack Against RSA Key Generation in Intel SGX SSL
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
Cache-Timing Attacks on RSA Key Generation
TPM-FAIL: TPM meets Timing and Lattice Attacks
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Constant-Time Callees with Variable-Time Callers
Preventing Page Faults from Telling Your Secrets
...
1
2
3
4
5
...