Pseudorandom black swans: Cache attacks on CTR_DRBG

S Cohney, A Kwong, S Paz, D Genkin… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …

SpyDetector: An approach for detecting side-channel attacks at runtime

Y Kulah, B Dincer, C Yilmaz, E Savas - International Journal of Information …, 2019 - Springer
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is
instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are …

Cache vs. key-dependency: Side channeling an implementation of Pilsung

D Genkin, R Poussier, RQ Sim, Y Yarom… - IACR Transactions on …, 2020 - tches.iacr.org
Over the past two decades, cache attacks have been identified as a threat to the security of
cipher implementations. These attacks recover secret information by combining …

Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography

A Weber, O Nikiforov, A Sauer, J Schickel… - … on Research in …, 2021 - Springer
Quantum cryptography allows one to transmit secret information securely, based on the laws
of quantum physics. It consists of (1) the transmission of physical particles like photons and …

Side-channel attacks in the internet of things: threats and challenges

A Zankl, H Seuschek, G Irazoqui… - Research anthology on …, 2021 - igi-global.com
Abstract The Internet of Things (IoT) rapidly closes the gap between the virtual and the
physical world. As more and more information is processed through this expanding network …

RiCaSi: rigorous cache side channel mitigation via selective circuit compilation

H Mantel, L Scheidel, T Schneider, A Weber… - Cryptology and Network …, 2020 - Springer
Cache side channels constitute a persistent threat to crypto implementations. In particular,
block ciphers are prone to attacks when implemented with a simple lookup-table approach …

Boosting profiled cache timing attacks with a priori analysis

C Rebeiro, D Mukhopadhyay - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The vulnerability of cryptographic devices to side-channel attacks is of interest in the domain
of information security. The success of a side-channel attack depends on the crypto …

Formalizing the Effect of Feistel cipher structures on differential cache attacks

C Rebeiro, PH Nguyen… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
The success of a side-channel attack depends mainly on three factors, namely, the cipher
algorithm, the attack platform, and the measurement noise. In this paper, we consider a class …

Flush+ Reload Attacks on SEED

M Seddigh, H Soleimany - The Computer Journal, 2022 - academic.oup.com
Flush+ Reload is a powerful access-driven cache attack in which the attacker leverages a
security weakness in the X86 processor architecture to extract the private data of the victim …

Improved differential cache attacks on SMS4

PH Nguyen, C Rebeiro, D Mukhopadhyay… - Information Security and …, 2013 - Springer
Block ciphers that have Feistel structures are prone to a class of cache attacks known as
differential cache attacks, which monitor power or timing side-channels to reveal the secret …