Authors
Dag Arne Osvik, Adi Shamir, Eran Tromer
Publication date
2006
Conference
CT-RSA 2006
Pages
1-20
Publisher
Springer
Description
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups. The attacks allow an unprivileged process to attack other processes running in parallel on the same processor, despite partitioning methods such as memory protection, sandboxing and virtualization. Some of our methods require only the ability to trigger services that perform encryption or MAC using the unknown key, such as encrypted disk partitions or secure network links. Moreover, we demonstrate an extremely strong type of attack, which requires knowledge of neither the specific plaintexts nor ciphertexts, and works by merely monitoring the effect of the cryptographic process on the cache. We discuss in detail several …
Total citations
2005200620072008200920102011201220132014201520162017201820192020202120222023202482647344955555456629810412414419418619617418349
Scholar articles
DA Osvik, A Shamir, E Tromer - Topics in Cryptology–CT-RSA 2006: The …, 2006