首页> 外文会议>International Conference on Financial Cryptography and Data Security >A Cache Timing Attack on AES in Virtualization Environments
【24h】

A Cache Timing Attack on AES in Virtualization Environments

机译:对虚拟化环境中AES的缓存定时攻击

获取原文

摘要

We show in this paper that the isolation characteristic of system virtualization can be bypassed by the use of a cache timing attack. Using Bernstein's correlation in this attack, an adversary is able to extract sensitive keying material from an isolated trusted execution domain. We demonstrate this cache timing attack on an embedded ARM-based platform running an L4 microkernel as virtualization layer. An attacker who gained access to the untrusted domain can extract the key of an AES-based authentication protocol used for a financial transaction. We provide measurements for different public domain AES implementations. Our results indicate that cache timing attacks are highly relevant in virtualization-based security architectures, such as trusted execution environments.
机译:我们在本文中展示了系统虚拟化的隔离特性,可以通过使用缓存定时攻击来绕过。在这次攻击中使用伯尔斯坦的相关性,对手能够从孤立的可信执行域中提取敏感的键控材料。我们在运行L4 Microkernel作为虚拟化层的基于嵌入式ARM的平台上展示了​​对嵌入式ARM的平台的缓存定时攻击。获得对不受信任域的攻击者可以提取用于金融交易的基于AES的身份验证协议的密钥。我们为不同的公共领域AES实现提供测量。我们的结果表明,基于虚拟化的安全体系结构中的缓存定时攻击是高度相关的,例如可信执行环境。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号