메뉴 건너뛰기




Volumn 8, Issue 4, 2012, Pages

Compiler mitigations for time attacks on modern x86 processors

Author keywords

Time based side channels; Variable latency instructions; X86 architecture

Indexed keywords

AUTOMATED SUPPORT; CODE TRANSFORMATION; COMPILER TECHNIQUES; DATA FLOW; EXECUTION TIME; SIDE CHANNEL ATTACK; SIDE-CHANNEL; TIMING INFORMATION; VARIABLE LATENCY INSTRUCTIONS;

EID: 84857879863     PISSN: 15443566     EISSN: 15443973     Source Type: Journal    
DOI: 10.1145/2086696.2086702     Document Type: Article
Times cited : (59)

References (48)
  • 3
    • 79960321311 scopus 로고    scopus 로고
    • Trace-driven cache attacks on AES
    • Lecture Notes in Computer Science Series
    • ACIIÇMEZ, O. AND KOÇ, Ç. 2006. Trace-driven cache attacks on AES. In Information and Communications Security. Lecture Notes in Computer Science Series, vol. 4307, 112-121.
    • (2006) Information and Communications Security , vol.4307 , pp. 112-121
    • Aciiçmez, O.1    Koç, C.2
  • 10
    • 33744529805 scopus 로고    scopus 로고
    • Cache-timing attacks on AES
    • The University of Illinois at Chicago
    • BERNSTEIN, D. J. 2005. Cache-timing attacks on AES. Tech. rep., The University of Illinois at Chicago.
    • (2005) Tech. Rep.
    • Bernstein, D.J.1
  • 12
    • 38549138136 scopus 로고    scopus 로고
    • Software mitigations to hedge AES against cache-based software side channel vulnerabilities
    • rep. 2006/052
    • BRICKELL, E., GRAUNKE, G., NEVE, M., AND SEIFERT, J.-P. 2006. Software mitigations to hedge AES against cache-based software side channel vulnerabilities. Cryptology ePrint Archive, rep. 2006/052.
    • (2006) Cryptology EPrint Archive
    • Brickell, E.1    Graunke, G.2    Neve, M.3    Seifert, J.-P.4
  • 14
    • 84892848299 scopus 로고    scopus 로고
    • Remote timing attacks are still practical
    • rep. 2011/232
    • BRUMLEY, B. B. AND TUVERI, N. 2011. Remote timing attacks are still practical. Cryptology ePrint Archive, rep. 2011/232.
    • (2011) Cryptology EPrint Archive
    • Brumley, B.B.1    Tuveri, N.2
  • 15
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • DOI 10.1016/j.comnet.2005.01.010, PII S1389128605000125, Web Traffic
    • BRUMLEY, D. AND BONEH, D. 2005. Remote timing attacks are practical. Computer Netw. 48, 5, 701-716. (Pubitemid 40684158)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 18
    • 60349110770 scopus 로고    scopus 로고
    • Opportunities and limits of remote timing attacks
    • CROSBY, S. A., WALLACH, D. S., AND RIEDI, R. H. 2009. Opportunities and limits of remote timing attacks. ACM Trans. Info. Syst. Sec. 12, 3, 17:1-17:29.
    • (2009) ACM Trans. Info. Syst. Sec. , vol.12 , Issue.3 , pp. 1701-1729
    • Crosby, S.A.1    Wallach, D.S.2    Riedi, R.H.3
  • 21
    • 79955893580 scopus 로고    scopus 로고
    • Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs
    • Copenhagen University of Engineering
    • FOG, A. 2011. Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs. Tech. rep., Copenhagen University of Engineering.
    • (2011) Tech. Rep.
    • Fog, A.1
  • 22
    • 42149194967 scopus 로고    scopus 로고
    • Statistically rigorous java performance evaluation
    • GEORGES, A., BUYTAERT, D., AND EECKHOUT, L. 2007. Statistically rigorous java performance evaluation. SIGPLAN Notices 42, 10, 57-76.
    • (2007) SIGPLAN Notices , vol.42 , Issue.10 , pp. 57-76
    • Georges, A.1    Buytaert, D.2    Eeckhout, L.3
  • 24
    • 85044043849 scopus 로고    scopus 로고
    • Instruction latencies and throughput for AMD and Intel x86 processors
    • GRANLUND, T. 2011. Instruction latencies and throughput for AMD and Intel x86 processors. Tech. rep.
    • (2011) Tech. Rep
    • Granlund, T.1
  • 26
    • 84857853559 scopus 로고    scopus 로고
    • Towards side-channel resistant block cipher usage or can we encrypt without side-channel countermeasures
    • rep. 2010/015
    • GUAJARDO, J. AND MENNINK, B. 2010. Towards side-channel resistant block cipher usage or can we encrypt without side-channel countermeasures. Cryptology ePrint Archive, rep. 2010/015.
    • (2010) Cryptology EPrint Archive
    • Guajardo, J.1    Mennink, B.2
  • 27
    • 64949133467 scopus 로고    scopus 로고
    • Advanced encryption standard (AES) instructions set
    • Intel Mobility Group
    • GUERON, S. 2008. Advanced encryption standard (AES) instructions set. Tech. rep., Intel Mobility Group.
    • (2008) Tech. Rep.
    • Gueron, S.1
  • 28
    • 84857870978 scopus 로고    scopus 로고
    • Cache games - Bringing access based cache attacks on aes to practice
    • rep. 2010/594
    • GULLASCH, D., BANGERTER, E., AND KRENN, S. 2010. Cache games - bringing access based cache attacks on aes to practice. Cryptology ePrint Archive, rep. 2010/594.
    • (2010) Cryptology EPrint Archive
    • Gullasch, D.1    Bangerter, E.2    Krenn, S.3
  • 29
    • 28044445125 scopus 로고    scopus 로고
    • Timing aware information flow security for a javaCard-like bytecode
    • DOI 10.1016/j.entcs.2005.02.031, PII S1571066105051492
    • HEDIN, D. AND SANDS, D. 2005. Timing aware information flow security for a Javacard-like bytecode. Electron. Notes Theoret. Comput. Science 141, 1, 163-182. (Pubitemid 41689008)
    • (2005) Electronic Notes in Theoretical Computer Science , vol.141 , Issue.1 SPEC. ISS. , pp. 163-182
    • Hedin, D.1    Sands, D.2
  • 33
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Advances in Cryptology - CRYPTO '96
    • KOCHER, P. C. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'96). 104-113. (Pubitemid 126106234)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 37
    • 36949003942 scopus 로고    scopus 로고
    • LLVM: A compilation framework for lifelong program analysis & transformation
    • Univ. of Illinois at Urbana-Champaign
    • LATTNER, C. AND ADVE, V. 2003. LLVM: A compilation framework for lifelong program analysis & transformation. Tech. rep., Univ. of Illinois at Urbana-Champaign.
    • (2003) Tech. Rep.
    • Lattner, C.1    Adve, V.2
  • 47
    • 34547331261 scopus 로고    scopus 로고
    • Covert and side channels due to processor architecture
    • DOI 10.1109/ACSAC.2006.20, 4041191, Proceedings - Annual Computer Security Applications Conference, ACSAC
    • WANG, Z. AND LEE, R. B. 2006. Covert and side channels due to processor architecture. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06). 473-482. (Pubitemid 351232939)
    • (2006) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 473-482
    • Wang, Z.1    Lee, R.B.2
  • 48
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • DOI 10.1145/1250662.1250723, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings
    • WANG, Z. AND LEE, R. B. 2007. New cache designs for thwarting software cache-based side channel attacks. SIGARCH Comput. Architec. News 35, 2, 494-505. (Pubitemid 47582127)
    • (2007) Proceedings - International Symposium on Computer Architecture , pp. 494-505
    • Wang, Z.1    Lee, R.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.