Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813708
|View full text |Cite
|
Sign up to set email alerts
|

The Spy in the Sandbox

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 184 publications
(45 citation statements)
references
References 17 publications
0
45
0
Order By: Relevance
“…We evaluate D F based on the following metrics: [26]; "Clock-edge-m": an modified version of "Clock-edge"; "Img (S)": the image loading sidechannel attack [45] inferring two files with S size difference; "Script (S)": the script parsing side-channel attack [45] inferring two files with S size difference; "Script-implicitClock (2M)": a modified version of "Script (2M)" using setInter al as an implicit clock; "Cache attack": a side-channel attack [38]; "Cache-m": a covert channel modified from "Cache attack"; "SVG Filtering": the SVG filter attack from Stone [44]. )…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We evaluate D F based on the following metrics: [26]; "Clock-edge-m": an modified version of "Clock-edge"; "Img (S)": the image loading sidechannel attack [45] inferring two files with S size difference; "Script (S)": the script parsing side-channel attack [45] inferring two files with S size difference; "Script-implicitClock (2M)": a modified version of "Script (2M)" using setInter al as an implicit clock; "Cache attack": a side-channel attack [38]; "Cache-m": a covert channel modified from "Cache attack"; "SVG Filtering": the SVG filter attack from Stone [44]. )…”
Section: Discussionmentioning
confidence: 99%
“…Timing attacks have continuously posed a threat to modern web browsers, violating users' privacy. For example, an adversary can infer the size of an external, cross-site resource based on the loading time [45,46]; a website can fingerprint the type of the browser based on the performance of JavaScript [33,34]; two adversaries can talk to each other via a covert channel [38,45].…”
Section: Introductionmentioning
confidence: 99%
“…The result is XORed with the round key x round . These three operations [8] SoC (single core) L1 Cache Spy process 16000 Xinjie et al [9] SoC (single core) L1 Cache Spy process 350 Liu et al [11] Bus-based MPSoC LLC -L3 Cache Spy process 33600 Oren et al [12] Bus-based MPSoC LLC -L3 Cache Browser process 5000 Yao et al [14] NoC-based MPSoC NoC Spy process Not mentioned Wassel [15] NoC-based MPSoC NoC Spy process Not mentioned Sepúlveda et al [16] NoC-based MPSoC NoC Spy process Not mentioned This work NoC-based MPSoC NoC (Shared Cache) Spy process 80 are pre-computed and stored in four tables (T 0 , T 1 , T 2 , T 3 ). Therefore, given a 16-byte plaintext p = (p 0 , .., p 15 ), encryption proceeds by computing a 16-byte intermediate state at each round r as presented by equation 1: …”
Section: B Memory Access In Aesmentioning
confidence: 99%
“…The typical timing leakage used by attackers are the cache memory, taking advantage that a cache miss and cache hit responses results in a huge difference on delay, where even the software can observe it. Previous Advanced Encryption Standard (AES) timing attacks focused on cache access monitoring are shown in [4][5] [6] [7][8] [9][10] [11] [12]. One of the most efficient timing attack technique is the Prime+Probe, proposed by Osvik et al [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation