Tampere University of Technology

TUTCRIS Research Portal

Cache storage attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages22-34
Number of pages13
ISBN (Print)9783319167145
DOIs
Publication statusPublished - 2015
Publication typeA4 Article in a conference publication
EventCryptographer`s Track at RSA Conference - , United States
Duration: 1 Jan 2000 → …

Publication series

NameLecture Notes in Computer Science
Volume9048
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceCryptographer`s Track at RSA Conference
CountryUnited States
Period1/01/00 → …

Abstract

Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing channels use latency to carry data, and are the foundation for timing and cache-timing attacks. Covert storage channels instead utilize existing system bits to carry data, and are not historically used for cryptanalytic side-channel attacks. This paper introduces a new storage channel made available through cache debug facilities on some embedded microprocessors. This channel is then extended to a cryptanalytic side-channel attack on AES software.

Keywords

  • Cache-timing attacks, Covert channels, Side-channel attacks, Storage channels, Timing attacks

Publication forum classification

Field of science, Statistics Finland

Downloads statistics

No data available