Trace-Driven Cache Attacks on AES (Short Paper)

@inproceedings{Aciimez2006TraceDrivenCA,
  title={Trace-Driven Cache Attacks on AES (Short Paper)},
  author={Onur Aciiçmez and Çetin Kaya Koç},
  booktitle={ICICS},
  year={2006}
}
Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem. We also evaluate the cost of the proposed attack in detail under the assumption of a noiseless environment. We develop an accurate mathematical model that we use in the cost analysis of our attack. We use two different metrics, specifically, the… CONTINUE READING
Highly Influential
This paper has highly influenced 12 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 84 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 51 extracted citations

Towards trace-driven cache attacks on Systems-on-Chips — exploiting bus communication

2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) • 2017
View 3 Excerpts
Highly Influenced

Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures

2016 IEEE Symposium on Security and Privacy (SP) • 2016
View 4 Excerpts
Highly Influenced

A Cache Trace Attack on CAMELLIA

InfoSecHiComNet • 2011
View 7 Excerpts
Highly Influenced

85 Citations

051015'08'11'14'17
Citations per Year
Semantic Scholar estimates that this publication has 85 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 18 references

Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel

IACR Cryptology ePrint Archive • 2002
View 4 Excerpts
Highly Influenced

AES power attack based on induced cache miss and countermeasure

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II • 2005
View 6 Excerpts
Highly Influenced

Cryptanalysis of Block Ciphers Implemented on Computers with Cache

Y. Tsunoo, E. Tsujihara, K. Minematsu, H. Miyauchi
ISITA 2002, • 2002
View 4 Excerpts
Highly Influenced

and Ç

O. Acıiçmez, W. Schindler
K. Koç. Cache Based Remote Timing Attack on the AES, Topics in Cryptology - CT-RSA 2007, The Cryptographers’ Track at the RSA Conference • 2007
View 3 Excerpts

Trace-Driven Cache Attacks on AES

IACR Cryptology ePrint Archive • 2006
View 1 Excerpt

Cache attacks and Countermeasures: the Case of AES

IACR Cryptology ePrint Archive • 2005
View 3 Excerpts

Similar Papers

Loading similar papers…