2006
DOI: 10.1109/acsac.2006.20
|View full text |Cite
|
Sign up to set email alerts
|

Covert and Side Channels Due to Processor Architecture

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
148
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 198 publications
(148 citation statements)
references
References 19 publications
0
148
0
Order By: Relevance
“…This latter channel (the logon detection channel), has the advantage that it does not depend on the hardware cache and is also effective in the absence of accurate clocks. Thus countermeasures aimed at removing accurate clocks [3] or the hardware cache mechanism for side channels [10,17] will not effect this channel. A limitation of the logon detection channel is that it does not give information about which password characters are in which positions; thus a follow-up guessing attack will require more time.…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This latter channel (the logon detection channel), has the advantage that it does not depend on the hardware cache and is also effective in the absence of accurate clocks. Thus countermeasures aimed at removing accurate clocks [3] or the hardware cache mechanism for side channels [10,17] will not effect this channel. A limitation of the logon detection channel is that it does not give information about which password characters are in which positions; thus a follow-up guessing attack will require more time.…”
Section: Our Resultsmentioning
confidence: 99%
“…As mentioned above, the logon detection channel cannot be defeated by eliminating the hardware cache mechanism [10,17]. Also, removing accurate clocks [3,4] is unlikely to close this channel either.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Side-channel attacks are based on observation of non-functional properties of a circuit, including execution time [8], power consumption [9], cache response times [10] or electromagnetic emissions [11]. For example, consider a circuit that stores and processes a 64-bit secret key 1 .…”
Section: Side-channel Analysismentioning
confidence: 99%
“…The capacity of covert timing channels has been increasing with the development of high-performance computers and high-speed networks. While covert timing channels studied in the 1970s could transfer only a few bits per second [2], covert timing channels in modern computers can transfer several megabits per second [3]. To defend against covert timing channels, researchers have proposed various methods to detect and disrupt them.…”
Section: Introductionmentioning
confidence: 99%