Towards More Practical Time-Driven Cache Attacks

Abstract : Side-channel attacks are usually performed by employing the “divide-and-conquer” approach, meaning that leaking information is collected in a divide step, and later on exploited in the conquer step. The idea is to extract as much information as possible during the divide step, and to exploit the gathered information as efficiently as possible within the conquer step. Focusing on both of these steps, we discuss potential enhancements of Bernstein’s cache-timing attack against the Advanced Encryption Standard (AES). Concerning the divide part, we analyze the impact of attacking different key-chunk sizes, aiming at the extraction of more information from the overall encryption time. Furthermore, we analyze the most recent improvement of time-driven cache attacks, presented by Aly and ElGayyar, according to its applicability on ARM Cortex-A platforms. For the conquer part, we employ the optimal key-enumeration algorithm as proposed by Veyrat-Charvillon et al. to significantly reduce the complexity of the exhaustive key-search phase compared to the currently employed threshold-based approach. This in turn leads to more practical attacks. Additionally, we provide extensive experimental results of the proposed enhancements on two Android-based smartphones, namely a Google Nexus S and a Samsung Galaxy SII.
Type de document :
Communication dans un congrès
David Naccache; Damien Sauveron. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-8501, pp.24-39, 2014, Information Security Theory and Practice. Securing the Internet of Things. 〈10.1007/978-3-662-43826-8_3〉
Liste complète des métadonnées

Littérature citée [24 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01400918
Contributeur : Hal Ifip <>
Soumis le : mardi 22 novembre 2016 - 16:19:12
Dernière modification le : mardi 3 juillet 2018 - 13:10:02
Document(s) archivé(s) le : mardi 21 mars 2017 - 03:10:48

Fichier

978-3-662-43826-8_3_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Raphael Spreitzer, Benoît Gérard. Towards More Practical Time-Driven Cache Attacks. David Naccache; Damien Sauveron. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-8501, pp.24-39, 2014, Information Security Theory and Practice. Securing the Internet of Things. 〈10.1007/978-3-662-43826-8_3〉. 〈hal-01400918〉

Partager

Métriques

Consultations de la notice

69

Téléchargements de fichiers

36