Fault Attacks on Encrypted General Purpose Compute Platforms

@article{Buhren2017FaultAO,
  title={Fault Attacks on Encrypted General Purpose Compute Platforms},
  author={Robert Buhren and Shay Gueron and Jan C. Nordholz and J. Seifert and Julian Vetter},
  journal={Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy},
  year={2017}
}
  • Robert Buhren, Shay Gueron, +2 authors Julian Vetter
  • Published 2017
  • Computer Science
  • Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
  • Adversaries with physical access to a target platform can perform cold boot or DMA attacks to extract sensitive data from the RAM. To prevent such attacks, hardware vendors announced respective processor extensions. AMD's extension SME will provide means to encrypt the RAM to protect security-relevant assets that reside there. The encryption will protect the user's content against passive eavesdropping. However, the level of protection it provides in scenarios that involve an adversary who… CONTINUE READING
    CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
    Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization
    • 6
    • Highly Influenced
    • PDF
    SEVered: Subverting AMD's Virtual Machine Encryption
    • 21
    • PDF
    Probabilistic Integrity for Low-Overhead Secure Memories
    Component integrity guarantees in software-defined networking infrastructure
    • 2
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 10 REFERENCES
    Practical Timing Side Channel Attacks against Kernel Space ASLR
    • 253
    • Highly Influential
    • PDF
    Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
    • 238
    • Highly Influential
    • PDF
    FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
    • 771
    • Highly Influential
    • PDF
    Last-Level Cache Side-Channel Attacks are Practical
    • 540
    • Highly Influential
    • PDF
    Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
    • 106
    • Highly Influential
    • PDF
    On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
    • 1,525
    • Highly Influential
    • PDF
    Funderbolt: Adventures in Thunderbolt DMA Attacks
    • 2013
    Inception. http:// www.breaknenter.org/projects/inception
    • 2016
    Method and apparatus for protecting public key schemes from timing and fault attacks, Nov
    • 1999
    http://amd-dev.wpengine.netdna-cdn.com/ wordpress/media/2013/12/AMD_Memory_ Encryption_Whitepaper_v7-Public.pdf
    • 2016