搜索结果: 1-14 共查到“军队指挥学 Cache Attacks”相关记录14条 . 查询时间(0.059 秒)
Modern cryptography requires the ability to securely generate pseudorandom numbers. However, despite decades of work on side channel attacks, there is little discussion of their application to pseudor...
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
TLS Bleichenbacher Side-channels
2018/12/3
Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible source...
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
Drive-by Key-Extraction Cache Attacks from Portable Code
Side-channel attack cache attack web page confinement
2018/2/1
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU...
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enf...
Statistical Analysis for Access-Driven Cache Attacks Against AES
AES side-channel analysis access-driven cache attacks
2016/12/8
In recent years, side-channel timing attacks utilizing architectural
behavior have been applied to cloud settings, presenting a realistic
and serious cyber threat. Access-driven cache attacks allow ...
Cache Attacks Enable Bulk Key Recovery on the Cloud
Amazon EC2 Co-location Detection RSA key recovery
2016/6/8
Cloud services keep gaining popularity despite the security concerns. While non-sensitive data is easily trusted to cloud, security critical data and applications are not. The main concern with the cl...
Multi-processor systems are becoming the de-facto standard
across different computing domains, ranging from high-end
multi-tenant cloud servers to low-power mobile platforms.
The denser integration...
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
ARM Cortex-A series processors time-driven cache attacks cache-collision attacks
2013/4/18
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop computers. Recently, also investigations of such attacks on testbeds with processors that are emplo...
Cache Games - Bringing Access Based Cache Attacks on AES to Practice
AES side channel access-based cache-attacks
2010/11/26
In this paper we analyze the case of AES and present an attack which is capable of recovering the full secret key in almost realtime for AES-128, requiring only a very limited number of observed encry...
Cache Attacks and Countermeasures: the Case of AES
side-channel attack cache memory access cryptanalysis
2009/2/25
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. This leakage reveals memory access patterns, which can be used for cryptan...
Trace-Driven Cache Attacks on AES
Side-channel cryptanalysis cache attacks trace-driven attacks AES
2008/11/14
Cache based side-channel attacks have recently been attracted
significant attention due to the new developments in the field. In this
paper, we present efficient trace-driven cache attacks on a wide...
Analysis of countermeasures against access driven cache attacks on AES
cache attacks AES threat model
2008/8/14
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models for tampering or sid...
On the complexity of side-channel attacks on AES-256 methodology and quantitative results on cache attacks -
side-channel cache attacks AES-192 AES-256 symmetric key cipher
2008/5/30
Larger key lengths translate into an exponential increase in the complexity of an exhaustive search. Side-channel attacks, however, use a divide-and-conquer approach and hence it is generally assumed ...