>
Fa   |   Ar   |   En
   modified cache template attack on aes  
   
نویسنده esfahani m. ,aref m. r. ,soleimany h.
منبع scientia iranica - 2022 - دوره : 29 - شماره : 4-D - صفحه:1949 -1956
چکیده    While it has been known for a long time that the cache behavior is a powerful source of the information leakage, more realistic attack scenarios have received a lot of attention by the cryptographic community. to develop practical cache-based attacks, there is an increasingly need to automate the process of finding exploitable cache-based side-channels in computer systems. cache template attack is a generic technique that utilizes flush+reload attack in order to automatically exploit cache vulnerability of intel platforms. cache template attack on t-table-based aes implementation consists of two phases including the profiling phase and the key exploitation phase.profiling is a preprocessing phase to monitor dependencies between the secret key and behavior of the cache memory. in addition, the addresses of t-tables can be obtained automatically.in the key exploitation phase, most significant bits (msbs) of the secret key bytes are retrieved by monitoring exploitable addresses. in this paper, we propose a simple yet effective searching technique which accelerates the profiling phase by a factor of at most 64. to verify the theoretical model of our technique, we implement the described attack on aes. the experimental results confirmed a shorter runtime of the attack in comparison to the original attack.
کلیدواژه cache memory; flush+reload attack; inclusive memory; aes; cache template attacks; automation
آدرس islamic azad university, karaj branch, department of mathematics, iran, sharif university of technology, department of electrical engineering, iran, shahid beheshti university, cyberspace research institute, iran
پست الکترونیکی h_soleimany@sbu.ac.ir
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved