Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)
DOI: 10.1109/secpri.1998.674829
|View full text |Cite
|
Sign up to set email alerts
|

Timing attacks against trusted path

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Trostle [9] describe timing attacks against the trusted path mechanism. Only a few trials were needed to obtain the length of the password with the first attack type.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Trostle [9] describe timing attacks against the trusted path mechanism. Only a few trials were needed to obtain the length of the password with the first attack type.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…However, we can imagine combining the timing analysis with the acoustic attack described herein to make decisions about the key clicks that were not unambiguously recognized based on the acoustic data alone. A related software-only timing attack is described in [21].…”
Section: Related Workmentioning
confidence: 99%
“…Trostle [14] presents a side channel against the Xlock program, using information associated with X Windows processing. [14] shows that keyboard interrupts and X processing can be detected and measured by an unprivileged process running on the system.…”
Section: Related Workmentioning
confidence: 99%
“…[14] shows that keyboard interrupts and X processing can be detected and measured by an unprivileged process running on the system. Classical covert channel countermeasures [3,15,4] will have some effectiveness in limiting or closing side channels as well.…”
Section: Related Workmentioning
confidence: 99%