Skip to Main content Skip to Navigation
Book sections

Cache-timing Attack Detection and Prevention Application to Crypto Libs and PQC

Abstract : With the publication of Spectre & Meltdown attacks, cache-timing exploitation techniques have received a wealth of attention recently. On the one hand, it is now well understood which some patterns in the C source code create observable unbalances in terms of timing. On the other hand, some practical cache-timing attacks (or Common Vulnerabilities and Exposures) have also been reported. However the exact relationship between vulnerabilities and exploitations is not enough studied as of today. In this article, we put forward a methodology to characterize the leakage induced by a "non-constant-time" construct in the source code. This methodology allows us to recover known attacks and to warn about possible new ones, possibly devastating.
Document type :
Book sections
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download
Contributor : Sylvain Guilley Connect in order to contact the contributor
Submitted on : Friday, August 14, 2020 - 8:27:48 PM
Last modification on : Wednesday, November 3, 2021 - 6:18:17 AM
Long-term archiving on: : Monday, November 30, 2020 - 8:04:03 PM


Files produced by the author(s)




Sebastien Carre, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, et al.. Cache-timing Attack Detection and Prevention Application to Crypto Libs and PQC. Springer. Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, pp.13-21, 2019, ⟨10.1007/978-3-030-16350-1_2⟩. ⟨hal-02915644⟩



Record views


Files downloads