Corpus ID: 15142848

Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud

@article{Inci2015SeriouslyGO,
  title={Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud},
  author={Mehmet Sinan Inci and Berk G{\"u}lmezoglu and Gorka Irazoqui Apecechea and T. Eisenbarth and B. Sunar},
  journal={IACR Cryptol. ePrint Arch.},
  year={2015},
  volume={2015},
  pages={898}
}
It has been six years since Ristenpart et al. [29] demonstrated the viability of co-location and provided the first concrete evidence for sensitive information leakage on a commercial cloud. We show that co-location can be achieved and detected by monitoring the last level cache in public clouds. More significantly, we present a full-fledged attack that exploits subtle leakages to recover RSA decryption keys from a colocated instance. We target a recently patched Libgcrypt RSA implementation by… Expand
107 Citations
Cross-VM Cache Attacks on AES
  • 12
  • PDF
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
  • 22
  • PDF
On-Demand Time Blurring to Support Side-Channel Defense
  • 7
  • PDF
Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy
  • 3
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
  • 3
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring
  • 2
  • PDF
Cache Misses and the Recovery of the Full AES 256 Key
  • 10
  • Highly Influenced
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 43 REFERENCES
Wait a Minute! A fast, Cross-VM Attack on AES
  • 235
  • PDF
Know Thy Neighbor: Crypto Library Detection in Cloud
  • 42
  • PDF
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
  • 247
  • PDF
Cross-VM side channels and their use to extract private keys
  • 700
  • PDF
A Placement Vulnerability Study in Multi-Tenant Public Clouds
  • 123
  • PDF
Detecting co-residency with active traffic analysis techniques
  • 95
  • PDF
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
  • 328
  • PDF
Predicting Secret Keys Via Branch Prediction
  • 276
  • PDF
...
1
2
3
4
5
...