Towards More Practical Time-Driven Cache Attacks

Raphael Spreitzer, Benoit Gérard

Research output: Chapter in Book/Report/Conference proceedingConference paper

Abstract

Side-channel attacks are usually performed by employing the "divide-and-conquer" approach, meaning that leaking information is collected in a divide step, and later on exploited in the conquer step. The idea is to extract as much information as possible during the divide step, and to exploit the gathered information as efficiently as possible within the conquer step.
Focusing on both of these steps, we discuss potential enhancements of Bernstein's cache-timing attack against the Advanced Encryption Standard (AES). Concerning the divide part, we analyze the impact of attacking different key-chunk sizes, aiming at the extraction of more information from the overall encryption time. Furthermore, we analyze the most recent improvement of time-driven cache attacks, presented by Aly and ElGayyar, according to its applicability on ARM Cortex-A platforms. For the conquer part, we employ the optimal key-enumeration algorithm as proposed by Veyrat-Charvillon et al. to significantly reduce the complexity of the exhaustive key-search phase compared to the currently employed threshold-based approach. This in turn leads to more practical attacks. Additionally, we provide extensive experimental results of the proposed enhancements on two Android-based smartphones, namely a Google Nexus S and a Samsung Galaxy SII.
Original languageEnglish
Title of host publicationInformation Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings.
EditorsDavid Naccache, Damien Sauveron
PublisherSpringer
Pages24-39
Volume8501
ISBN (Print)978-3-662-43825-1
DOIs
Publication statusPublished - 2014
EventWorkshop in Information Security Theory and Practices - Heraklion, Greece
Duration: 30 Jun 20142 Jul 2014

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceWorkshop in Information Security Theory and Practices
CountryGreece
CityHeraklion
Period30/06/142/07/14

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Dive into the research topics of 'Towards More Practical Time-Driven Cache Attacks'. Together they form a unique fingerprint.

Cite this