نتایج جستجو برای: timing attacks

تعداد نتایج: 142928  

2011
Amir Moradi Oliver Mischke Christof Paar Yang Li Kazuo Ohta Kazuo Sakiyama

At CHES 2010 two powerful new attacks were presented, namely the Fault Sensitivity Analysis and the Correlation Collision Attack. This paper shows how these ideas can be combined to create even stronger attacks. Two solutions are presented; both extract leakage information by the fault sensitivity analysis method while each one applies a slightly different collision attack to deduce the secret ...

2012
Mickael Bonnan Philippe Cabre

Background. Neuromyelitis optica (NMO) attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX) is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation...

2002
Katsuyuki Okeya Kouichi Sakurai

We show that a randomized addition-subtraction chains countermeasure against side channel attacks is vulnerable to SPA attack, a kind of side channel attack, under distinguishability between addition and doubling. A side channel attack is an attack that takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure ...

2015
Nethanel Gelernter Amir Herzberg

Cross-site search (XS-search) attacks circumvent the sameorigin policy and extract sensitive information, by using the time it takes for the browser to receive responses to search queries. This side-channel is usually considered impractical, due to the limited attack duration and high variability of delays. This may be true for naive XS-search attacks; however, we show that the use of better to...

2004
Elena Trichina Lesya Korkishko

In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks, this task became even more difficult because a programmer must take into account countermeasures against such attacks, which often increases computational time, or memory requirements, or both. In this paper we descr...

Journal: :CoRR 2017
Ferdinand Brasser Urs Müller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun Ahmad-Reza Sadeghi

Intel SGX isolates the memory of security-critical applications from the untrusted OS. However, it has been speculated that SGX may be vulnerable to side-channel attacks through shared caches. We developed new cache attack techniques customized for SGX. Our attack differs from other SGX cache attacks in that it is easy to deploy and avoids known detection approaches. We demonstrate the effectiv...

2017
Zizhan Zheng Ness B. Shroff Prasant Mohapatra

Cybersecurity is increasingly threatened by advanced and persistent attacks. As these attacks are often designed to disable a system (or a critical resource, e.g., a user account) repeatedly, it is crucial for the defender to keep updating its security measures to strike a balance between the risk of being compromised and the cost of security updates. Moreover, these decisions often need to be ...

Journal: :IEEE Transactions on Computers 2021

Timing-based side and covert channels in processor caches continue to be a threat modern computers. This work shows for the first time, systematic, large-scale analysis of Arm devices detailed results attacks processors are vulnerable to. Compared x86, uses different architectures, microarchitectural implementations, cache replacement policies, etc., which affects how can launched, security tes...

2015
José Bacelar Almeida Manuel Barbosa Gilles Barthe François Dupressoir

We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the S2N library, recently released by AWS Labs. This bug (now fixed) allowed bypassing the balancing countermeasures against timing attacks deployed in the implementation of the MAC-the...

2007
Werner Schindler

In the last decade side-channel cryptanalysis (timing attacks, power attacks, electromagnetic radiation attacks, cache-based attacks etc.) has become an important branch in cryptology. The goal of any side-channel attack is to extract key-dependent information from the leakage signal. For simplicity, we focus on power attacks in the following although our considerations could be adapted to radi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید