Software mitigations to hedge AES against cache-based software side channel vulnerabilities
E Brickell, G Graunke, M Neve, JP Seifert - Cryptology ePrint Archive, 2006 - eprint.iacr.org
Hardware side channel vulnerabilities have been studied for many years in embedded
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …
execution on underlying hardware by revealing information about timing and access …
New cache designs for thwarting software cache-based side channel attacks
Z Wang, RB Lee - Proceedings of the 34th annual international …, 2007 - dl.acm.org
Software cache-based side channel attacks are a serious new class of threats for computers.
Unlike physical side channel attacks that mostly target embedded cryptographic devices …
Unlike physical side channel attacks that mostly target embedded cryptographic devices …
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
Cache refinement type for side-channel detection of cryptographic software
Cache side-channel attacks exhibit severe threats to software security and privacy,
especially for cryptosystems. In this paper, we propose CaType, a novel refinement type …
especially for cryptosystems. In this paper, we propose CaType, a novel refinement type …
Attacking state-of-the-art software countermeasures—a case study for AES
S Tillich, C Herbst - … Hardware and Embedded Systems–CHES 2008: 10th …, 2008 - Springer
In order to protect software implementations of secret-key cryptographic primitives against
side channel attacks, a software developer has only a limited choice of countermeasures. A …
side channel attacks, a software developer has only a limited choice of countermeasures. A …
Side-channel attacks on cryptographic software
N Lawson - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
When it comes to cryptographic software, side channels are an often-overlooked threat. A
side channel is any observable side effect of computation that an attacker could measure …
side channel is any observable side effect of computation that an attacker could measure …
Single trace attack against RSA key generation in Intel SGX SSL
S Weiser, R Spreitzer, L Bodner - Proceedings of the 2018 on Asia …, 2018 - dl.acm.org
Microarchitectural side-channel attacks have received significant attention recently.
However, while side-channel analyses on secret key operations such as decryption and …
However, while side-channel analyses on secret key operations such as decryption and …
Side channel vulnerability metrics: the promise and the pitfalls
Side-channels enable attackers to break a cipher by exploiting observable information from
the cipher program's execution to infer its secret key. While some defenses have been …
the cipher program's execution to infer its secret key. While some defenses have been …
Cachezoom: How SGX amplifies the power of cache attacks
In modern computing environments, hardware resources are commonly shared, and parallel
computation is widely used. Parallel tasks can cause privacy and security problems if proper …
computation is widely used. Parallel tasks can cause privacy and security problems if proper …