2012
DOI: 10.1007/978-3-642-31424-7_40
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Quantification of Cache Side-Channels

Abstract: Abstract. The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such as cryptographic keys from implementation of AES and RSA. So far, there are no practical general-purpose countermeasures against this threat. In this paper we propose a novel method for automatically deriving upper bounds on the amount of information about the input that an adversary can extract from a program by observing the CPU's cache behavior. At the heart of our approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
93
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 94 publications
(94 citation statements)
references
References 32 publications
(54 reference statements)
0
93
0
1
Order By: Relevance
“…Observing a cache state models leakage about accesses to memory space that is shared between victim and adversary, as in [13]. For modeling disjoint memory spaces, we consider observations that only reveal how many memory blocks are loaded in each cache set [17].…”
Section: Leakage To Concurrent Adversariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Observing a cache state models leakage about accesses to memory space that is shared between victim and adversary, as in [13]. For modeling disjoint memory spaces, we consider observations that only reveal how many memory blocks are loaded in each cache set [17].…”
Section: Leakage To Concurrent Adversariesmentioning
confidence: 99%
“…CacheAudit makes use of the fact that one can obtain upper bounds for the information leaked through the cache by abstract interpretation and model counting [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Among the other measures vulnerability has been shown by Smith to have interesting qualities when considering a single attack by an attacker with no prior information about the secret [14], and Köpf et al show how to use probabilistic measures to quantify the security of side channels [15,16]. Providentially, for deterministic protocols the orderings induced by all measures of insecurity coincide [7,17], showing the robustness of the approach.…”
Section: State Of the Art And Related Workmentioning
confidence: 99%
“…Allowing some information leakage, Kopft et al [17] combines abstract interpretation and quantitative information-flow to analyze leakage bounds for cache attacks. Kim et al [15] propose StealthMem, a system level protection against cache attacks.…”
Section: Related Workmentioning
confidence: 99%