|
|
Enhanced Flush+Reload Attack on Aes
|
|
|
|
|
نویسنده
|
Seddigh Milad ,Soleimany Hadi
|
منبع
|
The Isc International Journal Of Information Security - 2020 - دوره : 12 - شماره : 2 - صفحه:81 -89
|
|
|
چکیده
|
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. flush+reload attack is a cache-based attack that makes use of resource sharing. t-table implementation of aes is commonly used in the crypto libraries like openssl. several flush+reload attacks on t-table implementation of aes have been proposed in the literature which requires a notable number of encryptions. in this paper, we present a technique to enhance the flush+reload attack on aes in the ciphertext-only scenario by significantly reducing the number of needed encryptions in both native and cross-vm setups. in this paper, we focus on finding the wrong key candidates and keep the right key by considering only the cache miss event. our attack is faster than previous flush+reload attacks. in particular, our method can speed-up the flush+reload attack in cross-vm environment significantly. to verify the theoretical model, we implemented the proposed attack.
|
کلیدواژه
|
Memory De-Duplication ,Flush+Reload Attack ,Aes ,T-Table Implementation
|
آدرس
|
Shahid Beheshti University, Cyberspace Research Institute, Iran, Shahid Beheshti University, Cyberspace Research Institute, Iran
|
پست الکترونیکی
|
h_soleimany@sbu.ac.ir
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|