메뉴 건너뛰기




Volumn , Issue , 2014, Pages 54-65

Information leaks without memory disclosures: Remote side channel attacks on diversified code

Author keywords

Address space layout randomization; Code diversity; Information leakage; Memory disclosure; Side channel attacks

Indexed keywords

CODES (SYMBOLS); CRIME;

EID: 84910683130     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660309     Document Type: Conference Paper
Times cited : (112)

References (46)
  • 2
    • 79959307327 scopus 로고    scopus 로고
    • New results on instruction cache attacks
    • ACIIÇMEZ, O., BRUMLEY, B. B., AND GRABHER, P. New results on instruction cache attacks. In CHES (2010).
    • (2010) CHES
    • Aciiçmez, O.1    Brumley, B.B.2    Grabher, P.3
  • 4
    • 70349705152 scopus 로고    scopus 로고
    • Data space randomization
    • BHATKAR, S., AND SEKAR, R. Data space randomization. In DIMVA (2008).
    • (2008) DIMVA
    • Bhatkar, S.1    Sekar, R.2
  • 5
    • 0003291909 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • BIHAM, E., AND SHAMIR, A. Differential fault analysis of secret key cryptosystems. In CRYPTO (1997).
    • (1997) CRYPTO
    • Biham, E.1    Shamir, A.2
  • 7
    • 84910613790 scopus 로고    scopus 로고
    • Leaking addresses with vulnerabilities that can't read good
    • BLAZAKIS, D. Leaking addresses with vulnerabilities that can't read good. SummerCon '13. http://www.trapbit.com/talks/Summerc0n2013-GCWoah.pdf.
    • SummerCon '13
    • Blazakis, D.1
  • 8
    • 77955204687 scopus 로고    scopus 로고
    • Cache-collision timing attacks against AES
    • BONNEAU, J., AND MIRONOV, I. Cache-collision timing attacks against AES. In CHES (2006).
    • (2006) CHES
    • Bonneau, J.1    Mironov, I.2
  • 9
    • 84892848299 scopus 로고    scopus 로고
    • Remote timing attacks are still practical
    • BRUMLEY, B. B., AND TUVERI, N. Remote timing attacks are still practical. In ESORICS (2011).
    • (2011) ESORICS
    • Brumley, B.B.1    Tuveri, N.2
  • 18
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • GIUFFRIDA, C., KUIJSTEN, A., AND TANENBAUM, A. S. Enhanced operating system security through efficient and fine-grained address space randomization. In the 21st USENIX Security Symposium (2012).
    • (2012) The 21st USENIX Security Symposium
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A.S.3
  • 20
    • 35048850492 scopus 로고    scopus 로고
    • Fault analysis of stream ciphers
    • Springer
    • HOCH, J. J., AND SHAMIR, A. Fault analysis of stream ciphers. In CHES (2004), Springer, pp. 240-253.
    • (2004) CHES , pp. 240-253
    • Hoch, J.J.1    Shamir, A.2
  • 21
    • 84889076199 scopus 로고    scopus 로고
    • Librando: Transparent code randomization for just-in-time compilers
    • HOMESCU, A., BRUNTHALER, S., LARSEN, P., AND FRANZ, M. librando: Transparent code randomization for just-in-time compilers. In CCS (2013).
    • (2013) CCS
    • Homescu, A.1    Brunthaler, S.2    Larsen, P.3    Franz, M.4
  • 22
    • 84881238589 scopus 로고    scopus 로고
    • Practical timing side channel attacks against kernel space aslr
    • HUND, R., WILLEMS, C., AND HOLZ, T. Practical timing side channel attacks against kernel space aslr. In Security and Privacy (2013).
    • (2013) Security and Privacy
    • Hund, R.1    Willems, C.2    Holz, T.3
  • 24
    • 51349125128 scopus 로고    scopus 로고
    • On second-order differential power analysis
    • JOYE, M., PAILLIER, P., AND SCHOENMAKERS, B. On second-order differential power analysis. In CHES (2005).
    • (2005) CHES
    • Joye, M.1    Paillier, P.2    Schoenmakers, B.3
  • 25
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • KC, G. S., KEROMYTIS, A. D., AND PREVELAKIS, V. Countering code-injection attacks with instruction-set randomization. In CCS (2003).
    • (2003) CCS
    • Kc, G.S.1    Keromytis, A.D.2    Prevelakis, V.3
  • 26
    • 39049113465 scopus 로고    scopus 로고
    • Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
    • KIL, C., JUN, J., BOOKHOLT, C., XU, J., AND NING, P. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. In ACSAC (2006).
    • (2006) ACSAC
    • Kil, C.1    Jun, J.2    Bookholt, C.3    Xu, J.4    Ning, P.5
  • 27
    • 0001297528 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • KOCHER, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In CRYPTO (1996).
    • (1996) CRYPTO
    • Kocher, P.C.1
  • 29
    • 78751484536 scopus 로고    scopus 로고
    • G-free: Defeating return-oriented programming through gadget-less binaries
    • ONARLIOGLU, K., BILGE, L., LANZI, A., BALZAROTTI, D., AND KIRDA, E. G-free: Defeating return-oriented programming through gadget-less binaries. In ACSAC'10 (2010).
    • (2010) ACSAC'10
    • Onarlioglu, K.1    Bilge, L.2    Lanzi, A.3    Balzarotti, D.4    Kirda, E.5
  • 31
    • 84878363772 scopus 로고    scopus 로고
    • Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
    • PAPPAS, V., POLYCHRONAKIS, M., AND KEROMYTIS, A. D. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Security and Privacy (2012).
    • (2012) Security and Privacy
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 32
    • 66049085129 scopus 로고    scopus 로고
    • Statistical analysis of second order differential power analysis
    • PROUFF, E., RIVAIN, M., AND BÉVAN, R. Statistical analysis of second order differential power analysis. IEEE Transactions on Computers 58, 6 (2009), 799-811.
    • (2009) IEEE Transactions on Computers , vol.58 , Issue.6 , pp. 799-811
    • Prouff, E.1    Rivain, M.2    Bévan, R.3
  • 33
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the ×86)
    • SHACHAM, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the ×86). In CCS (2007).
    • (2007) CCS
    • Shacham, H.1
  • 41
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on AES, and countermeasures
    • Jan
    • TROMER, E., OSVIK, D. A., AND SHAMIR, A. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology 23, 2 (Jan. 2010), 37-71.
    • (2010) Journal of Cryptology , vol.23 , Issue.2 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 42
    • 70349867776 scopus 로고    scopus 로고
    • Acoustic cryptanalysis: On nosy people and noisy machines
    • TROMER, E., AND SHAMIR, A. Acoustic cryptanalysis: on nosy people and noisy machines. In Eurocrypt Rump Session (2004).
    • (2004) Eurocrypt Rump Session
    • Tromer, E.1    Shamir, A.2
  • 45
    • 84869451043 scopus 로고    scopus 로고
    • Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
    • WARTELL, R., MOHAN, V., HAMLEN, K. W., AND LIN, Z. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. In CCS (2012).
    • (2012) CCS
    • Wartell, R.1    Mohan, V.2    Hamlen, K.W.3    Lin, Z.4
  • 46
    • 84869859962 scopus 로고    scopus 로고
    • Cross-vm side channels and their use to extract private keys
    • ZHANG, Y., JUELS, A., REITER, M. K., AND RISTENPART, T. Cross-vm side channels and their use to extract private keys. In CCS (2012).
    • (2012) CCS
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.