메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 605-622

Last-level cache side-channel attacks are practical

Author keywords

covert channel; cross VM side channel; ElGamal; last level cache; side channel attack

Indexed keywords

VIRTUAL MACHINE;

EID: 84945191701     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.43     Document Type: Conference Paper
Times cited : (989)

References (48)
  • 1
    • 79959534939 scopus 로고    scopus 로고
    • Yet another microarchitectural attack: Exploiting I-Cache
    • WS, Fairfax, VA, US, Nov
    • O. Aciiçmez, "Yet another microarchitectural attack: exploiting I-Cache," in Comp. Security Arch. WS, Fairfax, VA, US, Nov 2007, pp. 11-18.
    • (2007) Comp. Security Arch , pp. 11-18
    • Aciiçmez, O.1
  • 2
    • 43149120482 scopus 로고    scopus 로고
    • A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL
    • San Francisco, CA, US, Apr
    • O. Aciiçmez and W. Schindler, "A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL," in CT-RSA, San Francisco, CA, US, Apr 2008, pp. 256-273.
    • (2008) CT-RSA , pp. 256-273
    • Aciiçmez, O.1    Schindler, W.2
  • 3
    • 84876307879 scopus 로고    scopus 로고
    • On the power of simple branch prediction analysis
    • Singapore, Mar
    • O. Aciiçmez, Ç. K. Koç, and J.-P. Seifert, "On the power of simple branch prediction analysis," in ASIACCS, Singapore, Mar 2007, pp. 312-320.
    • (2007) ASIACCS , pp. 312-320
    • Aciiçmez, O.1    Koç, C.K.2    Seifert, J.-P.3
  • 4
    • 78049348331 scopus 로고    scopus 로고
    • New results on instruction cache attacks
    • Santa Barbara, CA, US, Apr
    • O. Aciiçmez, B. B. Brumley, and P. Grabher, "New results on instruction cache attacks," in CHES, Santa Barbara, CA, US, Apr 2010, pp. 110-124.
    • (2010) CHES , pp. 110-124
    • Aciiçmez, O.1    Brumley, B.B.2    Grabher, P.3
  • 5
    • 84921483196 scopus 로고    scopus 로고
    • 'Ooh aah., just a little bit': A small amount of side channel can go a long way
    • Busan, KR, Sep
    • N. Benger, J. van de Pol, N. P. Smart, and Y. Yarom, "'Ooh aah., just a little bit': A small amount of side channel can go a long way," in CHES, Busan, KR, Sep 2014, pp. 75-92.
    • (2014) CHES , pp. 75-92
    • Benger, N.1    Pol De J.Van2    Smart, N.P.3    Yarom, Y.4
  • 7
    • 0000742754 scopus 로고
    • Addition chain heuristics
    • Santa Barbara, CA, US, Aug
    • J. Bos and M. Coster, "Addition chain heuristics," in CRYPTO, Santa Barbara, CA, US, Aug 1989, pp. 400-407.
    • (1989) CRYPTO , pp. 400-407
    • Bos, J.1    Coster, M.2
  • 8
    • 72449122383 scopus 로고    scopus 로고
    • Cache-timing template attacks
    • B. B. Brumley and R. M. Hakala, "Cache-timing template attacks," in ASIACRYPT, 2009, pp. 667-684.
    • (2009) ASIACRYPT , pp. 667-684
    • Brumley, B.B.1    Hakala, R.M.2
  • 9
    • 84944905303 scopus 로고    scopus 로고
    • Universal exponentiation algorithm a first step towards Provable SPA-resistance
    • Paris, FR, May
    • C. Clavier and M. Joye, "Universal exponentiation algorithm a first step towards Provable SPA-resistance," in CHES, Paris, FR, May 2001, pp. 300-308.
    • (2001) CHES , pp. 300-308
    • Clavier, C.1    Joye, M.2
  • 10
    • 84910669114 scopus 로고    scopus 로고
    • The last mile: An empirical study of some timing channels on seL4
    • Scottsdale, AZ, US, Nov
    • D. Cock, Q. Ge, T. Murray, and G. Heiser, "The last mile: An empirical study of some timing channels on seL4," in CCS, Scottsdale, AZ, US, Nov 2014, pp. 570-581.
    • (2014) CCS , pp. 570-581
    • Cock, D.1    Ge, Q.2    Murray, T.3    Heiser, G.4
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Jul
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," Trans. Inform. Theory, no. 4, pp. 469-472, Jul 1985.
    • (1985) Trans. Inform. Theory , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 12
    • 84905374631 scopus 로고    scopus 로고
    • RSA key extraction via low-bandwidth acoustic cryptanalysis
    • Santa Barbara, CA, US, Aug
    • D. Genkin, A. Shamir, and E. Tromer, "RSA key extraction via low-bandwidth acoustic cryptanalysis," in CRYPTO, Santa Barbara, CA, US, Aug 2014, pp. 444-461.
    • (2014) CRYPTO , pp. 444-461
    • Genkin, D.1    Shamir, A.2    Tromer, E.3
  • 13
  • 15
    • 0000490812 scopus 로고    scopus 로고
    • A survey of fast exponentiation methods
    • Apr
    • D. M. Gordon, "A survey of fast exponentiation methods," J. Algorithms, no. 1, pp. 129-146, Apr 1998.
    • (1998) J. Algorithms , Issue.1 , pp. 129-146
    • Gordon, D.M.1
  • 16
    • 80051974249 scopus 로고    scopus 로고
    • Cache games - Bringing access-based cache attacks on AES to practice
    • Oakland, CA, US, may
    • D. Gullasch, E. Bangerter, and S. Krenn, "Cache games - bringing access-based cache attacks on AES to practice," in Symp. Security & Privacy, Oakland, CA, US, may 2011, pp. 490-595.
    • (2011) Symp. Security & Privacy , pp. 490-595
    • Gullasch, D.1    Bangerter, E.2    Krenn, S.3
  • 18
    • 0026156690 scopus 로고
    • Reducing timing channels with fuzzy time
    • Oakland, CA, US, May
    • W.-M. Hu, "Reducing timing channels with fuzzy time," in Symp. Security & Privacy, Oakland, CA, US, May 1991, pp. 8-20.
    • (1991) Symp. Security & Privacy , pp. 8-20
    • Hu, W.-M.1
  • 19
    • 84881238589 scopus 로고    scopus 로고
    • Practical timing side channel attacks against kernel space ASLR
    • San Francisco, CA, US, May
    • R. Hund, C. Willems, and T. Holz, "Practical timing side channel attacks against kernel space ASLR," in Symp. Security & Privacy, San Francisco, CA, US, May 2013, pp. 191-205.
    • (2013) Symp. Security & Privacy , pp. 191-205
    • Hund, R.1    Willems, C.2    Holz, T.3
  • 22
    • 84906771418 scopus 로고    scopus 로고
    • Wait a minute! a fast, cross-VM attack on AES
    • Gothenburg, SE, Sep
    • G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar, "Wait a minute! a fast, cross-VM attack on AES," in RAID, Gothenburg, SE, Sep 2014, pp. 299-319.
    • (2014) RAID , pp. 299-319
    • Irazoqui, G.1    Inci, M.S.2    Eisenbarth, T.3    Sunar, B.4
  • 23
    • 84945194762 scopus 로고    scopus 로고
    • S$A: A shared cache attack that works across cores and defies VM sandboxing-and its application to AES
    • San Jose, CA, US, May
    • G. Irazoqui, T. Eisenbarth, and B. Sunar, "S$A: A shared cache attack that works across cores and defies VM sandboxing-and its application to AES," in IEEE: Security & Privacy, San Jose, CA, US, May 2015.
    • (2015) IEEE: Security & Privacy
    • Irazoqui, G.1    Eisenbarth, T.2    Sunar, B.3
  • 24
    • 85073538603 scopus 로고    scopus 로고
    • STEALTH-mem: System-level protection against cache-based side channel attacks in the cloud
    • Bellevue, WA, US, Aug
    • T. Kim, M. Peindo, and G. Mainer-Ruiz, "STEALTH-MEM: System-level protection against cache-based side channel attacks in the Cloud," in USENIX Security, Bellevue, WA, US, Aug 2012.
    • (2012) USENIX Security
    • Kim, T.1    Peindo, M.2    Mainer-Ruiz, G.3
  • 25
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • Feb
    • V. I. Levenshtein, "Binary codes capable of correcting deletions, insertions and reversals," Soviet Physics Doklady, p. 707, Feb 1966.
    • (1966) Soviet Physics Doklady , pp. 707
    • Levenshtein, V.I.1
  • 26
    • 0030646163 scopus 로고    scopus 로고
    • Preventing denial-of-service attacks on a μ-kernel for WebOSes
    • Cape Cod, MA, US, May
    • J. Liedtke, N. Islam, and T. Jaeger, "Preventing denial-of-service attacks on a μ-kernel for WebOSes," in 6th HotOS, Cape Cod, MA, US, May 1997, pp. 73-79.
    • (1997) 6th HotOS , pp. 73-79
    • Liedtke, J.1    Islam, N.2    Jaeger, T.3
  • 30
    • 84945212779 scopus 로고    scopus 로고
    • How to benchmark code execution times on intel IA-32 and IA-64 instruction set architectures
    • Sep
    • G. Paoloni, How to Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures, Intel Corporation, Sep 2010.
    • (2010) Intel Corporation
    • Paoloni, G.1
  • 32
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off my cloud: Exploring information leakage in third-party compute clouds
    • Chicago, IL, US, Nov
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off my cloud: Exploring information leakage in third-party compute clouds," in CCS, Chicago, IL, US, Nov 2009, pp. 199-212.
    • (2009) CCS , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 33
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," CACM, no. 2, pp. 120-126, Feb 1978.
    • (1978) CACM , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 34
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks in AES, and countermeasures
    • Jan
    • E. Tromer, D. A. Osvik, and A. Shamir, "Efficient cache attacks in AES, and countermeasures," J. Cryptology, no. 2, pp. 37-71, Jan 2010.
    • (2010) J. Cryptology , Issue.2 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 36
    • 85008938648 scopus 로고    scopus 로고
    • Scheduler-based defenses against cross-VM side-channels
    • San Diego, CA, US, Aug
    • V. Varadarajan, T. Ristenpart, and M. Swift, "Scheduler-based defenses against cross-VM side-channels," in USENIX Security, San Diego, CA, US, Aug 2014, pp. 687-702.
    • (2014) USENIX Security , pp. 687-702
    • Varadarajan, V.1    Ristenpart, T.2    Swift, M.3
  • 37
    • 80955143535 scopus 로고    scopus 로고
    • Eliminating fine grained timers in Xen
    • Chicago, IL, US, Oct
    • B. C. Vattikonda, S. Das, and H. Shacham, "Eliminating fine grained timers in Xen," in CCSW, Chicago, IL, US, Oct 2011, pp. 41-46.
    • (2011) CCSW , pp. 41-46
    • Vattikonda, B.C.1    Das, S.2    Shacham, H.3
  • 38
    • 84945196398 scopus 로고    scopus 로고
    • VMware Inc., Palo Alto, CA, US
    • Large Page Performance, VMware Inc., Palo Alto, CA, US, 2008.
    • (2008) Large Page Performance
  • 39
    • 84945212781 scopus 로고    scopus 로고
    • Security considerations and disallowing inter-virtual machine transparent page sharing
    • VMware Inc. Oct
    • VMware Inc., "Security considerations and disallowing inter-virtual machine transparent page sharing," VMware Knowledge Base 2080735 http://kb.vmware. com/selfservice/microsites/search.do?language=en-US& cmd=displayKC&externalId=2080735, Oct 2014.
    • (2014) VMware Knowledge Base 2080735
  • 40
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • Diego, CA, US, Jun
    • Z. Wang and R. B. Lee, "New Cache Designs for Thwarting Software Cache-based Side Channel Attacks," in ISCA, San Diego, CA, US, Jun 2007, pp. 494-505.
    • (2007) ISCA, San , pp. 494-505
    • Wang, Z.1    Lee, R.B.2
  • 41
    • 66749109266 scopus 로고    scopus 로고
    • A novel cache architecture with enhanced performance and security
    • Como, IT, Nov
    • -, "A Novel Cache Architecture with Enhanced Performance and Security," in MICRO, Como, IT, Nov 2008, pp. 83-93.
    • (2008) MICRO , pp. 83-93
    • Wang, Z.1    Lee, R.B.2
  • 42
    • 84945979212 scopus 로고    scopus 로고
    • Whispers in the hyperspace: High-speed covert channel attacks in the cloud
    • Bellevue, WA, US
    • Z. Wu, Z. Xu, and H. Wang, "Whispers in the hyperspace: High-speed covert channel attacks in the cloud," in USENIX Security, Bellevue, WA, US, 2012, pp. 159-173.
    • (2012) USENIX Security , pp. 159-173
    • Wu, Z.1    Xu, Z.2    Wang, H.3
  • 43
    • 80955157902 scopus 로고    scopus 로고
    • An exploration of L2 cache covert channels in virtualized environments
    • Chicago, IL, US, Oct
    • Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting, "An exploration of L2 cache covert channels in virtualized environments," in CCSW, Chicago, IL, US, Oct 2011, pp. 29-40.
    • (2011) CCSW , pp. 29-40
    • Xu, Y.1    Bailey, M.2    Jahanian, F.3    Joshi, K.4    Hiltunen, M.5    Schlichting, R.6
  • 44
    • 84906749327 scopus 로고    scopus 로고
    • Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack
    • Feb
    • Y. Yarom and N. Benger, "Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack," Cryptology ePrint Archive, Report 2014/140, Feb 2014, http://eprint.iacr.org/.
    • (2014) Cryptology EPrint Archive, Report 2014/140
    • Yarom, Y.1    Benger, N.2
  • 45
    • 85076305746 scopus 로고    scopus 로고
    • FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack
    • San Diego, CA, US, Aug
    • Y. Yarom and K. Falkner, "FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack," in USENIX Security, San Diego, CA, US, Aug 2014, pp. 719-732.
    • (2014) USENIX Security , pp. 719-732
    • Yarom, Y.1    Falkner, K.2
  • 46
    • 80052008862 scopus 로고    scopus 로고
    • Homealone: Co-residency detection in the cloud via side-channel analysis
    • Berkeley, CA, US, May
    • Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, "Homealone: Co-residency detection in the cloud via side-channel analysis," in Symp. Security & Privacy, Berkeley, CA, US, May 2011, pp. 313-328.
    • (2011) Symp. Security & Privacy , pp. 313-328
    • Zhang, Y.1    Juels, A.2    Oprea, A.3    Reiter, M.K.4
  • 47
    • 84869859962 scopus 로고    scopus 로고
    • Cross-VM side channels and their use to extract private keys
    • Raleigh, NC, US, Oct
    • Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, "Cross-VM side channels and their use to extract private keys," in CCS, Raleigh, NC, US, Oct 2012, pp. 305-316.
    • (2012) CCS , pp. 305-316
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4
  • 48
    • 84910683194 scopus 로고    scopus 로고
    • Cross-tenant side-channel attacks in PaaS clouds
    • Scottsdale, AZ, US, Nov
    • -, "Cross-tenant side-channel attacks in PaaS clouds," in CCS, Scottsdale, AZ, US, Nov 2014, pp. 990-1003.
    • (2014) CCS , pp. 990-1003
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.