메뉴 건너뛰기




Volumn 12, Issue 3, 2009, Pages

Opportunities and Limits of Remote Timing Attacks

Author keywords

Information leakage; Jitter; Timing attacks

Indexed keywords

CONFIDENTIAL INFORMATIONS; INFORMATION LEAKAGE; LOCAL NETWORKS; NETWORK RESPONSE; NETWORK SERVERS; RSA PRIVATE KEYS; TIMING ATTACKS; TIMING CHANNELS; WEB SERVERS;

EID: 60349110770     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1455526.1455530     Document Type: Article
Times cited : (63)

References (45)
  • 1
    • 0009983757 scopus 로고    scopus 로고
    • A study of Internet round-trip delay
    • Tech. rep. CS-TR-3736, Department of Computer Science, University of Maryland
    • ACHARYA, A. AND SALTZ, J. 1996. A study of Internet round-trip delay. Tech. rep. CS-TR-3736, Department of Computer Science, University of Maryland.
    • (1996)
    • ACHARYA, A.1    SALTZ, J.2
  • 3
    • 84944627047 scopus 로고    scopus 로고
    • ACIIÇMEZ, O., ÇETIN KAYA KOÇ, AND SEIFERT, J.-P. 2007a. Predicting secret keys via branch prediction. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'07). San Francisco, 225-242.
    • ACIIÇMEZ, O., ÇETIN KAYA KOÇ, AND SEIFERT, J.-P. 2007a. Predicting secret keys via branch prediction. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'07). San Francisco, 225-242.
  • 4
    • 33745773656 scopus 로고    scopus 로고
    • ACIIÇMEZ, O., SCHINDLER, W., AND ÇETIN K. KOÇ. 2005. Improving brumley and boneh timing attack on unprotected ssl implementations. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). Alexandria, VA, 139-146.
    • ACIIÇMEZ, O., SCHINDLER, W., AND ÇETIN K. KOÇ. 2005. Improving brumley and boneh timing attack on unprotected ssl implementations. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). Alexandria, VA, 139-146.
  • 8
    • 0035361868 scopus 로고    scopus 로고
    • Critical path analysis of TCP transactions
    • BARFORD, P. AND CROVELLA, M. 2001. Critical path analysis of TCP transactions. IEEE / ACM Trans. Netw. 9, 3, 238-248.
    • (2001) IEEE / ACM Trans. Netw , vol.9 , Issue.3 , pp. 238-248
    • BARFORD, P.1    CROVELLA, M.2
  • 13
    • 35248836120 scopus 로고    scopus 로고
    • Password interception in a TLS/SSL channel
    • Proceedings of the Annual International Cryptology Conference CRYPTO'03, Springer-Verlag
    • CANVEL, B., HILTGEN, A., VUAGNOUX, M., AND VAUDENAY, S. 2003. Password interception in a TLS/SSL channel. In Proceedings of the Annual International Cryptology Conference (CRYPTO'03). Lecture Notes in Computer Science, vol. 2729. Springer-Verlag, 583-599.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 583-599
    • CANVEL, B.1    HILTGEN, A.2    VUAGNOUX, M.3    VAUDENAY, S.4
  • 14
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • CARTER, J. L. AND WEGMAN, M. N. 1979. Universal classes of hash functions. J. Comput. Syst. Sci. 18, 2, 143-154.
    • (1979) J. Comput. Syst. Sci , vol.18 , Issue.2 , pp. 143-154
    • CARTER, J.L.1    WEGMAN, M.N.2
  • 15
    • 14844350422 scopus 로고    scopus 로고
    • A fine-grained view of high-performance networking
    • CASNER, S., ALAETTINOGLU, C., AND KUAN, C.-C. 2001. A fine-grained view of high-performance networking. NANOG22 meeting. http://www.nanog.org/mtg-0105/casner.html.
    • (2001) NANOG22 meeting
    • CASNER, S.1    ALAETTINOGLU, C.2    KUAN, C.-C.3
  • 17
    • 0000524071 scopus 로고
    • Measurement considerations for assessing unidirectional latencies
    • CLAFFY, K. C., POLYZOS, G. C., AND BRAUN, H.-W. 1993. Measurement considerations for assessing unidirectional latencies. Internetw.: Resear. Exper. 4, 3, 121-132.
    • (1993) Internetw.: Resear. Exper , vol.4 , Issue.3 , pp. 121-132
    • CLAFFY, K.C.1    POLYZOS, G.C.2    BRAUN, H.-W.3
  • 19
  • 22
    • 0033705991 scopus 로고    scopus 로고
    • Side channel cryptanalysis of product ciphers
    • KELSEY, J., SCHNEIER, B., WAGNER, D., AND HALL, C. 2000. Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8, 2-3, 141-158.
    • (2000) J. Comput. Secur , vol.8 , Issue.2-3 , pp. 141-158
    • KELSEY, J.1    SCHNEIER, B.2    WAGNER, D.3    HALL, C.4
  • 23
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Proceedings of the Annual International Cryptology Conference CRYPTO'96, N. Koblitz, Ed, Springer-Verlag, Santa Barbara, CA
    • KOCHER, P. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of the Annual International Cryptology Conference (CRYPTO'96). N. Koblitz, Ed. Lecture Notes in Computer Science, vol. 1109. Springer-Verlag, Santa Barbara, CA.
    • (1996) Lecture Notes in Computer Science , vol.1109
    • KOCHER, P.1
  • 24
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Proceedings of the Annual International Cryptology Conference CRYPTO'99, Wiener, 1666. Springer-Verlag, Santa Barbara, CA
    • KOCHER, P., JAFFE, J., AND JUN, B. 1999. Differential power analysis. In Proceedings of the Annual International Cryptology Conference (CRYPTO'99). M. Wiener, Ed. Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, Santa Barbara, CA.
    • (1999) Ed. Lecture Notes in Computer Science , vol.1000
    • KOCHER, P.1    JAFFE, J.2    JUN, B.3
  • 28
    • 84984039280 scopus 로고    scopus 로고
    • LAMPSON, B. W. 1983. Hints for computer system design. SIGOPS Oper. Syst. Rev. 15, 5, 33-48. IEEE Softw. 1, 1, 11-28.
    • LAMPSON, B. W. 1983. Hints for computer system design. SIGOPS Oper. Syst. Rev. 15, 5, 33-48. IEEE Softw. 1, 1, 11-28.
  • 29
    • 0026242010 scopus 로고
    • Internet time synchronization: The Network Time Protocol
    • MILLS, D. L. 1991. Internet time synchronization: The Network Time Protocol. IEEE Trans. Comm. 39, 10, 1482-1493.
    • (1991) IEEE Trans. Comm , vol.39 , Issue.10 , pp. 1482-1493
    • MILLS, D.L.1
  • 32
    • 0028758682 scopus 로고
    • On the dynamics and significance of low frequency components of Internet load
    • MUKHERJEE, A. 1994. On the dynamics and significance of low frequency components of Internet load. Internetw.: Resear. Exper. 5, 4, 163-205.
    • (1994) Internetw.: Resear. Exper , vol.5 , Issue.4 , pp. 163-205
    • MUKHERJEE, A.1
  • 33
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • Proceedings of the Cryptographers' Track at the RSA Conference CT-RSA'06, Springer
    • OSVIK, D. A., SHAMIR, A., AND TROMER, E. 2006. Cache attacks and countermeasures: The case of AES. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'06). Lecture Notes in Computer Science, vol. 3860. Springer, 1-20.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 1-20
    • OSVIK, D.A.1    SHAMIR, A.2    TROMER, E.3
  • 34
    • 1942457187 scopus 로고    scopus 로고
    • Theoretical use of cache memory as a cryptanalytic side-channel
    • Tech. rep. CSTR-02-003, Department of Computer Science, University of Bristol
    • PAGE, D. 2002. Theoretical use of cache memory as a cryptanalytic side-channel. Tech. rep. CSTR-02-003, Department of Computer Science, University of Bristol.
    • (2002)
    • PAGE, D.1
  • 41
    • 84983436061 scopus 로고    scopus 로고
    • Optimized timing attacks against public key cryptosystems
    • SCHINDLERW. 2002. Optimized timing attacks against public key cryptosystems. Statistics Decisions 20, 191-210.
    • (2002) Statistics Decisions , vol.20 , pp. 191-210
    • SCHINDLERW1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.