New Results on Instruction Cache Attacks

  title={New Results on Instruction Cache Attacks},
  author={O. Aciiçmez and B. Brumley and Philipp Grabher},
  • O. Aciiçmez, B. Brumley, Philipp Grabher
  • Published in CHES 2010
  • Computer Science
  • We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be… CONTINUE READING
    156 Citations

    Figures, Tables, and Topics from this paper

    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
    • 71
    • Highly Influenced
    An Improved Trace Driven Instruction Cache Timing Attack on RSA
    • 5
    • PDF
    CacheBleed: a timing attack on OpenSSL constant-time RSA
    • 110
    • PDF
    Automatic Quantification of Cache Side-Channels
    • 102
    • PDF
    Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
    • 259
    • PDF
    MASCAT: Stopping Microarchitectural Attacks Before Execution
    • 26
    • PDF


    Yet another MicroArchitectural Attack:: exploiting I-Cache
    • 214
    • PDF
    A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
    • 100
    Cache-Timing Template Attacks
    • 133
    • PDF
    Advances on Access-Driven Cache Attacks on AES
    • 170
    • PDF
    Cache Based Remote Timing Attack on the AES
    • 176
    • PDF
    New cache designs for thwarting software cache-based side channel attacks
    • 451
    • PDF
    Cache Attacks and Countermeasures: The Case of AES
    • 1,085
    • Highly Influential
    • PDF
    • 589
    • Highly Influential
    • PDF
    On the power of simple branch prediction analysis
    • 238
    • PDF
    Secretly Monopolizing the CPU Without Superuser Privileges
    • 48
    • PDF