Last-Level Cache Side-Channel Attacks are Practical

作者: Fangfei Liu , Yuval Yarom , Qian Ge , Gernot Heiser , Ruby B. Lee

DOI: 10.1109/SP.2015.43

关键词: Pre-play attackVirtual machineComputer securitySide channel attackElGamal encryptionComputer scienceCryptographyCacheWatermarking attackCovert channelTiming attackComputer networkCiphertext-only attackCloud computing

摘要: … We exploit hardware features that are outside the control of the cloud provider (inclusive caches) or are controllable but generally enabled in the VMM for performance reasons (large …

参考文章(43)
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar, Wait a Minute! A fast, Cross-VM Attack on AES recent advances in intrusion detection. pp. 299- 319 ,(2014) , 10.1007/978-3-319-11379-1_15
Christophe Clavier, Marc Joye, Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance cryptographic hardware and embedded systems. pp. 300- 308 ,(2001) , 10.1007/3-540-44709-1_25
Daniel J. Bernstein, Tanja Lange, Peter Schwabe, The Security Impact of a New Cryptographic Library Progress in Cryptology – LATINCRYPT 2012. pp. 159- 176 ,(2012) , 10.1007/978-3-642-33481-8_9
Yuval Yarom, Katrina Falkner, None, FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack usenix security symposium. pp. 719- 732 ,(2014)
Dag Arne Osvik, Adi Shamir, Eran Tromer, Cache attacks and countermeasures: the case of AES the cryptographers track at the rsa conference. pp. 1- 20 ,(2006) , 10.1007/11605805_1
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar, S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES 2015 IEEE Symposium on Security and Privacy. pp. 591- 604 ,(2015) , 10.1109/SP.2015.42
Haining Wang, Zhang Xu, Zhenyu Wu, Whispers in the hyper-space: high-speed covert channel attacks in the cloud usenix security symposium. pp. 9- 9 ,(2012)
Billy Bob Brumley, Risto M. Hakala, Cache-Timing Template Attacks international conference on the theory and application of cryptology and information security. pp. 667- 684 ,(2009) , 10.1007/978-3-642-10366-7_39
James Franklin, The elements of statistical learning : data mining, inference,and prediction The Mathematical Intelligencer. ,vol. 27, pp. 83- 85 ,(2005) , 10.1007/BF02985802