2018
DOI: 10.1007/978-3-319-93387-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Drive-By Key-Extraction Cache Attacks from Portable Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 42 publications
(41 citation statements)
references
References 31 publications
0
40
0
Order By: Relevance
“…The Prime+Probe Technique. Past cache-based attacks from web browsers [28,64] employ the Prime+Probe technique [65,68], which exploits the set-associative structure. Each round of attack consists of three steps.…”
Section: Cache Side-channel Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…The Prime+Probe Technique. Past cache-based attacks from web browsers [28,64] employ the Prime+Probe technique [65,68], which exploits the set-associative structure. Each round of attack consists of three steps.…”
Section: Cache Side-channel Attacksmentioning
confidence: 99%
“…Prime+Probe has been used for attacks on data [65,68] and instruction [3,4] caches, as well as for attacks on the LLC [43,59]. It has been shown practical in multiple settings, including across different virtual machines in cloud environments [40] and from mobile code [28,64].…”
Section: Cache Side-channel Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Both algorithms 1 and 2 are designed to compensate imprecise and noisy timing sources. Although previous work [12,43] suggests that accurate timers can be crafted even in environments that restrict access to high-precision timing sources, this engineering effort can be saved for our inference attack. We believe this adds to the practicality of our attack and shows that inference attacks are a realistic threat.…”
Section: Finding Eviction Setsmentioning
confidence: 99%