Towards More Practical Time-Driven Cache Attacks

Raphael Spreitzer, Benoit Gérard

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Side-channel attacks are usually performed by employing the "divide-and-conquer" approach, meaning that leaking information is collected in a divide step, and later on exploited in the conquer step. The idea is to extract as much information as possible during the divide step, and to exploit the gathered information as efficiently as possible within the conquer step.
Focusing on both of these steps, we discuss potential enhancements of Bernstein's cache-timing attack against the Advanced Encryption Standard (AES). Concerning the divide part, we analyze the impact of attacking different key-chunk sizes, aiming at the extraction of more information from the overall encryption time. Furthermore, we analyze the most recent improvement of time-driven cache attacks, presented by Aly and ElGayyar, according to its applicability on ARM Cortex-A platforms. For the conquer part, we employ the optimal key-enumeration algorithm as proposed by Veyrat-Charvillon et al. to significantly reduce the complexity of the exhaustive key-search phase compared to the currently employed threshold-based approach. This in turn leads to more practical attacks. Additionally, we provide extensive experimental results of the proposed enhancements on two Android-based smartphones, namely a Google Nexus S and a Samsung Galaxy SII.
Originalspracheenglisch
TitelInformation Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings.
Redakteure/-innenDavid Naccache, Damien Sauveron
Herausgeber (Verlag)Springer
Seiten24-39
Band8501
ISBN (Print)978-3-662-43825-1
DOIs
PublikationsstatusVeröffentlicht - 2014
VeranstaltungWorkshop in Information Security Theory and Practices - Heraklion, Griechenland
Dauer: 30 Juni 20142 Juli 2014

Publikationsreihe

NameLecture Notes in Computer Science
Herausgeber (Verlag)Springer

Konferenz

KonferenzWorkshop in Information Security Theory and Practices
Land/GebietGriechenland
OrtHeraklion
Zeitraum30/06/142/07/14

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Untersuchen Sie die Forschungsthemen von „Towards More Practical Time-Driven Cache Attacks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren