Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks

@article{Ashokkumar2016HighlyEA,
  title={Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks},
  author={C. Ashokkumar and Ravi Prakash Giri and B. Menezes},
  journal={2016 IEEE European Symposium on Security and Privacy (EuroS\&P)},
  year={2016},
  pages={261-275}
}
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES is an specially attractive target since it makes extensive use of cache-resident table lookups. We consider two attack scenarios where either the plaintext or ciphertext is known. We employ a multi-threaded spy process and ensure that each time slice provided to the victim (running AES) is small… Expand
“S-Box” Implementation of AES Is Not Side Channel Resistant
Security evaluation of Cache Mappings Schemes
  • 2019
CacheD: Identifying Cache-Based Timing Channels in Production Software
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
Cache-timing attacks without a profiling phase
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
...
1
2
3
...

References

SHOWING 1-10 OF 46 REFERENCES
Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice
Efficient Cache Attacks on AES, and Countermeasures
Cache Attacks and Countermeasures: The Case of AES
An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
Design and implementation of an espionage network for cache-based side channel attacks on AES
Understanding cache attacks
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
...
1
2
3
4
5
...