Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/107842
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Allan, T. | - |
dc.contributor.author | Brumley, B. | - |
dc.contributor.author | Falkner, K. | - |
dc.contributor.author | Van De Pol, J. | - |
dc.contributor.author | Yarom, Y. | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Proceedings - Annual Computer Security Applications Conference, ACSAC, 2016, vol.5-9-December-2016, pp.422-435 | - |
dc.identifier.isbn | 9781450347716 | - |
dc.identifier.issn | 1063-9527 | - |
dc.identifier.uri | http://hdl.handle.net/2440/107842 | - |
dc.description.abstract | Interference between processes executing on shared hardware can be used to mount performance-degradation attacks. However, in most cases, such attacks offer little benefit for the adversary. In this paper, we demonstrate that software-based performancedegradation attacks can be used to amplify side-channel leaks, enabling the adversary to increase both the amount and the quality of information captured. We identify a new information leak in the OpenSSL implementation of the ECDSA digital signature algorithm, albeit seemingly unexploitable due to the limited granularity of previous trace procurement techniques. To overcome this imposing hurdle, we combine the information leak with a microarchitectural performancedegradation attack that can slow victims down by a factor of over 150. We demonstrate how this combination enables the amplification of a side-channel sufficiently to exploit this new information leak. Using the combined attack, an adversary can break a private key of the secp256k1 curve, used in the Bitcoin protocol, after observing only 6 signatures-a four-fold improvement over all previously described attacks. | - |
dc.description.statementofresponsibility | Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom | - |
dc.language.iso | en | - |
dc.publisher | ACM New York | - |
dc.relation.ispartofseries | ACM International Conference Proceeding Series | - |
dc.rights | © 2016 Copyright held by the owner/author(s). Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). | - |
dc.source.uri | http://dx.doi.org/10.1145/2991079.2991084 | - |
dc.title | Amplifying side channels through performance degradation | - |
dc.type | Conference paper | - |
dc.contributor.conference | 32nd Annual Conference on Computer Security Applications (ACSAC '16) (5 Dec 2016 - 8 Dec 2016 : Los Angeles, California) | - |
dc.identifier.doi | 10.1145/2991079.2991084 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Falkner, K. [0000-0003-0309-4332] | - |
dc.identifier.orcid | Yarom, Y. [0000-0003-0401-4197] | - |
Appears in Collections: | Aurora harvest 8 Computer Science publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RA_hdl_107842.pdf Restricted Access | Restricted Access | 301.72 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.