DOI: 10.29007/nwj8
|View full text |Cite
|
Sign up to set email alerts
|

End-to-end automated cache-timing attack driven by Machine Learning

Abstract: Cache timing attacks are serious security threats that exploit cache memories to steal secret information.We believe that the identification of a sequence of operations from a set of cache-timing data measurements is not a trivial step when building an attack. We present a recurrent neural network model able to automatically retrieve a sequence of function calls from cache-timings. Inspired from natural language processing, our model is able to learn on partially labelled data. We use the model to unfold an en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…To avoid printing the same character multiple times, a cache miss counter between the keystrokes can be used [40]. Note that multiple cache lines can be considered to further increase the accuracy of the keylogger [61], [107], [15].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To avoid printing the same character multiple times, a cache miss counter between the keystrokes can be used [40]. Note that multiple cache lines can be considered to further increase the accuracy of the keylogger [61], [107], [15].…”
Section: Discussionmentioning
confidence: 99%
“…Wang et al [107] presented a similar automated approach to detect keystrokes in graphics libraries. Carre et al [15] mounted an automated approach for cache attacks driven by machine learning. With that approach, they were able to attack the secp256k11 OpenSSL ECDSA implementation and extract 256 bits of the secret key.…”
Section: E Automated Discovery Of Side Channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The timing difference varies significantly with processor architectures, timers, and fencing instructions used around timer readings. Carré's work [7] uses a Flush+Flush monitor on ECDSA algorithm. Figure 1 shows the setup for our persistent cache monitoring, where the spy runs consecutive CLFLUSH and times each one.…”
Section: Persistent Cache Monitoring Attackmentioning
confidence: 99%
“…From the lab evaluator's standpoint, the alignment is indeed an issue, but it is not the core protection, and resynchronization techniques do exist (cross-correlation, dynamic time warping (DTW), etc.) and/or some analyses are invariant in the time offsets (frequency domain analysis, convolutional neural networks or CNN [7], recurrent neural networks with connectionist temporal classification loss [8], etc.). Therefore, in the rest of the paper, we assume a progression of the analysis in two steps: horizontal and then vertical.…”
Section: Introductionmentioning
confidence: 99%