A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Cache attacks and countermeasures: the case of AES

DA Osvik, A Shamir, E Tromer - Topics in Cryptology–CT-RSA 2006: The …, 2006 - Springer
We describe several software side-channel attacks based on inter-process leakage through
the state of the CPU's memory cache. This leakage reveals memory access patterns, which …

[PDF][PDF] Cache-timing attacks on AES

DJ Bernstein - 2005 - mimoza.marmara.edu.tr
This paper demonstrates complete AES key recovery from known-plaintext timings of a
network server on another computer. This attack should be blamed on the AES design, not …

Efficient cache attacks on AES, and countermeasures

E Tromer, DA Osvik, A Shamir - Journal of Cryptology, 2010 - Springer
We describe several software side-channel attacks based on inter-process leakage through
the state of the CPU's memory cache. This leakage reveals memory access patterns, which …

A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad

G Piret, JJ Quisquater - … Hardware and Embedded Systems-CHES 2003 …, 2003 - Springer
In this paper we describe a differential fault attack technique working against Substitution-
Permutation Networks, and requiring very few faulty ciphertexts. The fault model used is …

Cache-collision timing attacks against AES

J Bonneau, I Mironov - … Hardware and Embedded Systems-CHES 2006 …, 2006 - Springer
This paper describes several novel timing attacks against the common table-driven software
implementation of the AES cipher. We define a general attack strategy using a simplified …

Fault based cryptanalysis of the advanced encryption standard (AES)

J Blömer, JP Seifert - … Cryptography: 7th International Conference, FC 2003 …, 2003 - Springer
In this paper we describe several fault attacks on the Advanced Encryption Standard (AES).
First, using optical/eddy current fault induction attacks as recently publicly presented by …

Cryptanalysis of DES implemented on computers with cache

Y Tsunoo, T Saito, T Suzaki, M Shigeri… - … and Embedded Systems …, 2003 - Springer
This paper presents the results of applying an attack against the Data Encryption Standard
(DES) implemented in some applications, using side-channel information based on CPU …

The program counter security model: Automatic detection and removal of control-flow side channel attacks

D Molnar, M Piotrowski, D Schultz… - Information Security and …, 2006 - Springer
We introduce new methods for detecting control-flow side channel attacks, transforming C
source code to eliminate such attacks, and checking that the transformed code is free of …

Transient-Execution Attacks: A Computer Architect Perspective

L Fiolhais, L Sousa - ACM Computing Surveys, 2023 - dl.acm.org
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …