A framework for leaking secrets to past instructions
- 23 May 2022
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Cryptographic Engineering
- Vol. 12 (4), 461-473
- https://doi.org/10.1007/s13389-022-00289-8
Abstract
No abstract availableKeywords
Funding Information
- National Science Foundation (CNS 1718880)
- National Security Agency (H98230-18-D-0009)
This publication has 30 references indexed in Scilit:
- MemJam: A False Dependency Attack Against Constant-Time Crypto ImplementationsInternational Journal of Parallel Programming, 2018
- ret2specPublished by Association for Computing Machinery (ACM) ,2018
- MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGXPublished by Springer Science and Business Media LLC ,2018
- Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScriptPublished by Springer Science and Business Media LLC ,2017
- CacheBleed: a timing attack on OpenSSL constant-time RSAJournal of Cryptographic Engineering, 2017
- CacheBleed: A Timing Attack on OpenSSL Constant Time RSAPublished by Springer Science and Business Media LLC ,2016
- Efficient Cache Attacks on AES, and CountermeasuresJournal of Cryptology, 2009
- Cheap Hardware Parallelism Implies Cheap SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Covert and Side Channels Due to Processor ArchitectureTwenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2006
- Simultaneous multithreadingACM SIGARCH Computer Architecture News, 1995