Software mitigations to hedge AES against cache-based software side channel vulnerabilities

E Brickell, G Graunke, M Neve, JP Seifert - Cryptology ePrint Archive, 2006 - eprint.iacr.org
Hardware side channel vulnerabilities have been studied for many years in embedded
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti… - Information Systems, 2020 - Elsevier
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …

New cache designs for thwarting software cache-based side channel attacks

Z Wang, RB Lee - Proceedings of the 34th annual international …, 2007 - dl.acm.org
Software cache-based side channel attacks are a serious new class of threats for computers.
Unlike physical side channel attacks that mostly target embedded cryptographic devices …

A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Cache refinement type for side-channel detection of cryptographic software

K Jiang, Y Bao, S Wang, Z Liu, T Zhang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Cache side-channel attacks exhibit severe threats to software security and privacy,
especially for cryptosystems. In this paper, we propose CaType, a novel refinement type …

Attacking state-of-the-art software countermeasures—a case study for AES

S Tillich, C Herbst - … Hardware and Embedded Systems–CHES 2008: 10th …, 2008 - Springer
In order to protect software implementations of secret-key cryptographic primitives against
side channel attacks, a software developer has only a limited choice of countermeasures. A …

Side-channel attacks on cryptographic software

N Lawson - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
When it comes to cryptographic software, side channels are an often-overlooked threat. A
side channel is any observable side effect of computation that an attacker could measure …

Single trace attack against RSA key generation in Intel SGX SSL

S Weiser, R Spreitzer, L Bodner - Proceedings of the 2018 on Asia …, 2018 - dl.acm.org
Microarchitectural side-channel attacks have received significant attention recently.
However, while side-channel analyses on secret key operations such as decryption and …

Side channel vulnerability metrics: the promise and the pitfalls

T Zhang, F Liu, S Chen, RB Lee - … of the 2nd International Workshop on …, 2013 - dl.acm.org
Side-channels enable attackers to break a cipher by exploiting observable information from
the cipher program's execution to infer its secret key. While some defenses have been …

Cachezoom: How SGX amplifies the power of cache attacks

A Moghimi, G Irazoqui, T Eisenbarth - Cryptographic Hardware and …, 2017 - Springer
In modern computing environments, hardware resources are commonly shared, and parallel
computation is widely used. Parallel tasks can cause privacy and security problems if proper …