Tampere University of Technology

TUTCRIS Research Portal

New results on instruction cache attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Standard

New results on instruction cache attacks. / AcIiçmez, Onur; Brumley, Billy Bob; Grabher, Philipp.

Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. 2010. p. 110-124 (Lecture Notes in Computer Science; Vol. 6225).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Harvard

AcIiçmez, O, Brumley, BB & Grabher, P 2010, New results on instruction cache attacks. in Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. Lecture Notes in Computer Science, vol. 6225, pp. 110-124, 12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Santa Barbara, CA, United States, 17/08/10. https://doi.org/10.1007/978-3-642-15031-9_8

APA

AcIiçmez, O., Brumley, B. B., & Grabher, P. (2010). New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings (pp. 110-124). (Lecture Notes in Computer Science; Vol. 6225). https://doi.org/10.1007/978-3-642-15031-9_8

Vancouver

AcIiçmez O, Brumley BB, Grabher P. New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. 2010. p. 110-124. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-642-15031-9_8

Author

AcIiçmez, Onur ; Brumley, Billy Bob ; Grabher, Philipp. / New results on instruction cache attacks. Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. 2010. pp. 110-124 (Lecture Notes in Computer Science).

Bibtex - Download

@inproceedings{f17fffc0a56d4503affea146135b4b92,
title = "New results on instruction cache attacks",
abstract = "We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.",
author = "Onur AcIi{\cc}mez and Brumley, {Billy Bob} and Philipp Grabher",
year = "2010",
month = "11",
day = "5",
doi = "10.1007/978-3-642-15031-9_8",
language = "English",
isbn = "3642150306",
series = "Lecture Notes in Computer Science",
pages = "110--124",
booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings",

}

RIS (suitable for import to EndNote) - Download

TY - GEN

T1 - New results on instruction cache attacks

AU - AcIiçmez, Onur

AU - Brumley, Billy Bob

AU - Grabher, Philipp

PY - 2010/11/5

Y1 - 2010/11/5

N2 - We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.

AB - We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL's DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.

U2 - 10.1007/978-3-642-15031-9_8

DO - 10.1007/978-3-642-15031-9_8

M3 - Conference contribution

SN - 3642150306

SN - 9783642150302

T3 - Lecture Notes in Computer Science

SP - 110

EP - 124

BT - Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings

ER -