Pseudorandom black swans: Cache attacks on CTR_DRBG
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …
However, despite decades of work on side-channel attacks, there is little discussion of their …
SpyDetector: An approach for detecting side-channel attacks at runtime
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is
instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are …
instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are …
Cache vs. key-dependency: Side channeling an implementation of Pilsung
Over the past two decades, cache attacks have been identified as a threat to the security of
cipher implementations. These attacks recover secret information by combining …
cipher implementations. These attacks recover secret information by combining …
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
A Weber, O Nikiforov, A Sauer, J Schickel… - … on Research in …, 2021 - Springer
Quantum cryptography allows one to transmit secret information securely, based on the laws
of quantum physics. It consists of (1) the transmission of physical particles like photons and …
of quantum physics. It consists of (1) the transmission of physical particles like photons and …
Side-channel attacks in the internet of things: threats and challenges
Abstract The Internet of Things (IoT) rapidly closes the gap between the virtual and the
physical world. As more and more information is processed through this expanding network …
physical world. As more and more information is processed through this expanding network …
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
Cache side channels constitute a persistent threat to crypto implementations. In particular,
block ciphers are prone to attacks when implemented with a simple lookup-table approach …
block ciphers are prone to attacks when implemented with a simple lookup-table approach …
Boosting profiled cache timing attacks with a priori analysis
The vulnerability of cryptographic devices to side-channel attacks is of interest in the domain
of information security. The success of a side-channel attack depends on the crypto …
of information security. The success of a side-channel attack depends on the crypto …
Formalizing the Effect of Feistel cipher structures on differential cache attacks
The success of a side-channel attack depends mainly on three factors, namely, the cipher
algorithm, the attack platform, and the measurement noise. In this paper, we consider a class …
algorithm, the attack platform, and the measurement noise. In this paper, we consider a class …
Flush+ Reload Attacks on SEED
Flush+ Reload is a powerful access-driven cache attack in which the attacker leverages a
security weakness in the X86 processor architecture to extract the private data of the victim …
security weakness in the X86 processor architecture to extract the private data of the victim …
Improved differential cache attacks on SMS4
Block ciphers that have Feistel structures are prone to a class of cache attacks known as
differential cache attacks, which monitor power or timing side-channels to reveal the secret …
differential cache attacks, which monitor power or timing side-channels to reveal the secret …