New Results on Instruction Cache Attacks

Onur Aciicmez, Billy Bob Brumley, Philipp Grabher

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

87 Citations (Scopus)

Abstract

We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL’s DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.
Translated title of the contributionNew Results on Instruction Cache Attacks
Original languageEnglish
Title of host publicationCryptographic Hardware and Embedded Systems - CHES 2010
PublisherSpringer Berlin Heidelberg
Pages110-124
Volume6225
Publication statusPublished - 2010

Bibliographical note

ISBN: 9783642150302
Publisher: Springer Verlag LNCS 6225
Name and Venue of Conference: Cryptographic Hardware and Embedded Systems, CHES 2010
Other identifier: 2001252

Fingerprint

Dive into the research topics of 'New Results on Instruction Cache Attacks'. Together they form a unique fingerprint.

Cite this