【24h】

Modeling Side-Channel Cache Attacks on AES

机译:对AES的侧通道缓存攻击建模

获取原文

摘要

In recent years, side-channel attacks have gained increasing attention, mainly due to their ability to extract sensitive information from their victims in an effortless way. Also, with the development and spread of cloud computing, where victims and potential attackers share physical infrastructure, these attacks are becoming a serious concern. For performance reasons, several resources as CPU cache memories have to be shared, leaving a door opened for attackers. However, when cryptographic processes are properly characterized it is possible to detect attacks which abuse one shared resource as, for example, CPU cache. In this paper we present a timing characterization of a process implementing a cryptographic algorithm such as AES. Then we characterize the same encryption process when suffering a cache attack and when sharing the CPU with other different processes to evaluate how they affect it and get accurate models. The main idea of this work is getting an accurate timing model to distinguish when a process is or not being attacked regarding to timing measurements. Once we get the model, we provide a detection algorithm that detects over 96% of attacks with false positive rates around 5%. The false positive rate is reduced to 0% when discarding the initial transitory state related to the booting stage of a new process.
机译:近年来,侧渠攻击越来越受到关注,主要是因为他们以轻松的方式从受害者中提取敏感信息的能力。此外,随着云计算的发展和传播,受害者和潜在攻击者共享物理基础设施,这些攻击正变得严重关切。出于性能原因,必须共享几个资源作为CPU缓存存储器,为攻击者打开了一扇门。但是,当正确表征加密过程时,可以检测滥用滥用一个共享资源的攻击,例如CPU缓存。在本文中,我们介绍了实现诸如AES的加密算法的过程的时序特征。然后,在遭受缓存攻击时以及与其他不同进程共享CPU以评估它们的影响并获得准确模型时,我们表征了相同的加密过程。这项工作的主要思想正在获得准确的时序模型,以区分过程何时或未攻击关于定时测量的攻击。一旦我们获得了模型,我们就提供了一种检测算法,该算法检测超过96%的攻击,误报率约为5%。当丢弃与新过程的引导阶段相关的初始暂时状态时,假阳性率降至0%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号