首页> 外文会议>IEEE Symposium on Security and Privacy >Timing Attacks Against Trusted Path
【24h】

Timing Attacks Against Trusted Path

机译:针对受信任路径的时间攻击

获取原文

摘要

We present new attacks against a user workstation's trusted path mechanism. These timing attacks can cause a user's password to leak bits. The timing attacks can then be combined with network authentication protocol brute force attacks against the remainder of the key space to obtain the user's password. We present several countermeasures against this attack. We also define a property of user systems (workstations) called Trojan horse non-persistence. Workstations that fail to have this property are more vulnerable to the timing attack and other Trojan horse attacks.
机译:我们对用户工作站的可信路径机制呈现新的攻击。这些时序攻击可能导致用户的密码泄漏位。然后,可以将定时攻击与网络认证协议的Brute Force攻击结合,以获取所述密钥空间的其余部分以获得用户的密码。我们提出了对此攻击的几个对策。我们还定义了一个名为Trojan Horse非持久性的用户系统(工作站)的属性。未能拥有此属性的工作站更容易受到时序攻击和其他特洛伊木马攻击的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号