2020
DOI: 10.1016/j.mejo.2020.104935
|View full text |Cite
|
Sign up to set email alerts
|

Template attacks on ECC implementations using performance counters in CPU

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…With PMU, we can gain insight into the processor's behaviors such as the number of instructions that are assigned to a particular port, the number of cache misses/hits at different levels in the memory hierarchy, the number of mis-predicted branches, et al It is initially designed for software developers to analyze the code execution efficiency and therefore help them to optimize their applications. However, because it is capable to disclose the impacts of an instruction on the processor in a fine-grained manner, the researchers have also try to utilize the PMU to achieve other aims such as reverse engineering the black-box processors [42,45,49], and inferring the keys of encryption algorithms [4,5,16].…”
Section: Performance Monitor Unit (Pmu)mentioning
confidence: 99%
See 3 more Smart Citations
“…With PMU, we can gain insight into the processor's behaviors such as the number of instructions that are assigned to a particular port, the number of cache misses/hits at different levels in the memory hierarchy, the number of mis-predicted branches, et al It is initially designed for software developers to analyze the code execution efficiency and therefore help them to optimize their applications. However, because it is capable to disclose the impacts of an instruction on the processor in a fine-grained manner, the researchers have also try to utilize the PMU to achieve other aims such as reverse engineering the black-box processors [42,45,49], and inferring the keys of encryption algorithms [4,5,16].…”
Section: Performance Monitor Unit (Pmu)mentioning
confidence: 99%
“…PMU provides a lot of information about the execution processes of instructions, which have been verified useful to achieve side channel attacks for inferring the keys of encryption algorithms. For example, Uhsadel et al [47] and Götzfried et al [16] use the PMU counters that measure the number of L1-cache hits or misses to implement the access-driven cache-timing attack on the AES implementation in the OpenSSL library; Bhattacharya et al [5] propose to use the PMU counters that measure the number of branch misses to compromise keys of RSA; Asvija et al [4] propose to attack the ECC by using the power-related counters to implement the template attack.…”
Section: Performance Monitor Unit (Pmu)mentioning
confidence: 99%
See 2 more Smart Citations