Skip to Main content Skip to Navigation
Book sections

Cache-timing Attack Detection and Prevention Application to Crypto Libs and PQC

Abstract : With the publication of Spectre & Meltdown attacks, cache-timing exploitation techniques have received a wealth of attention recently. On the one hand, it is now well understood which some patterns in the C source code create observable unbalances in terms of timing. On the other hand, some practical cache-timing attacks (or Common Vulnerabilities and Exposures) have also been reported. However the exact relationship between vulnerabilities and exploitations is not enough studied as of today. In this article, we put forward a methodology to characterize the leakage induced by a "non-constant-time" construct in the source code. This methodology allows us to recover known attacks and to warn about possible new ones, possibly devastating.
Document type :
Book sections
Complete list of metadatas

Cited literature [26 references]  Display  Hide  Download

https://hal-cnrs.archives-ouvertes.fr/hal-02915644
Contributor : Sylvain Guilley <>
Submitted on : Friday, August 14, 2020 - 8:27:48 PM
Last modification on : Wednesday, August 19, 2020 - 3:06:30 AM

File

19_COSADE_cache_attribution.pd...
Files produced by the author(s)

Identifiers

Collections

Citation

Sebastien Carre, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, et al.. Cache-timing Attack Detection and Prevention Application to Crypto Libs and PQC. Springer. Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, pp.13-21, 2019, ⟨10.1007/978-3-030-16350-1_2⟩. ⟨hal-02915644⟩

Share

Metrics

Record views

6

Files downloads

29