Last-Level Cache Side-Channel Attacks are Practical
Top Cited Papers
- 1 May 2015
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10816011,p. 605-622
- https://doi.org/10.1109/sp.2015.43
Abstract
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the capacity of the covert channel the attack creates and demonstrate a cross-core, cross-VM attack on multiple versions of GnuPG. Our technique achieves a high attack resolution without relying on weaknesses in the OS or virtual machine monitor or on sharing memory between attacker and victim.Keywords
This publication has 24 references indexed in Scilit:
- Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed ExponentiationPublished by Springer Science and Business Media LLC ,2015
- Just a Little Bit MorePublished by Springer Science and Business Media LLC ,2015
- Wait a Minute! A fast, Cross-VM Attack on AESPublished by Springer Science and Business Media LLC ,2014
- The Security Impact of a New Cryptographic LibraryLecture Notes in Computer Science, 2012
- An exploration of L2 cache covert channels in virtualized environmentsPublished by Association for Computing Machinery (ACM) ,2011
- Cache-Timing Template AttacksLecture Notes in Computer Science, 2009
- Universal Exponentiation Algorithm A First Step towards Provable SPA-ResistanceLecture Notes in Computer Science, 2001
- A Survey of Fast Exponentiation MethodsJournal of Algorithms, 1998
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978