2014
DOI: 10.1007/978-3-642-54792-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Leakage Resilience against Concurrent Cache Attacks

Abstract: Abstract. In this paper we show how to engineer proofs of security for software implementations of leakage-resilient cryptosystems on execution platforms with concurrency and caches. The proofs we derive are based on binary executables of the cryptosystem and on simple but realistic models of microprocessors.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…However, allowing a limited number of crashes with the same key will bound the information that an adversary can gain. For instance, leakage resilient cryptography has been sucessfully applied to real implementations in the case of side-channels caused by CPU caches [5]. Alternatively, bounds on the leakage could be obtained by leveraging on quantitative estimations on implementations using techinques such as [28].…”
Section: Attack-resistance Of Isrmentioning
confidence: 99%
“…However, allowing a limited number of crashes with the same key will bound the information that an adversary can gain. For instance, leakage resilient cryptography has been sucessfully applied to real implementations in the case of side-channels caused by CPU caches [5]. Alternatively, bounds on the leakage could be obtained by leveraging on quantitative estimations on implementations using techinques such as [28].…”
Section: Attack-resistance Of Isrmentioning
confidence: 99%
“…in the non-concurrent attacker model. A follow-up [14] provides an upper bound for the leakage of AES in the concurrent attacker model; the result is stated in an abstract setting, and under some restrictions. The results of [14] cannot be used to assert the security of constant-time programs against concurrent cache attacks.…”
Section: Related Workmentioning
confidence: 99%
“…those that can control and observe the cache state before and after, but not during, the execution of the victim program. A description of CacheAudit's support for concurrent, asynchronous access-based adversaries as in [104] can be found in [84].…”
Section: Side-channelsmentioning
confidence: 99%
“…One of our prime targets for future work is to derive security guarantees that hold for multiple executions of the victim process. One possibility to achieve this is to employ leakage-resilient cryptosystems [81,82], where our work can be used to bound the range of the leakage functions, as demonstrated in [84].…”
Section: Meaning Of Boundsmentioning
confidence: 99%
See 1 more Smart Citation