Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/107842
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAllan, T.-
dc.contributor.authorBrumley, B.-
dc.contributor.authorFalkner, K.-
dc.contributor.authorVan De Pol, J.-
dc.contributor.authorYarom, Y.-
dc.date.issued2016-
dc.identifier.citationProceedings - Annual Computer Security Applications Conference, ACSAC, 2016, vol.5-9-December-2016, pp.422-435-
dc.identifier.isbn9781450347716-
dc.identifier.issn1063-9527-
dc.identifier.urihttp://hdl.handle.net/2440/107842-
dc.description.abstractInterference between processes executing on shared hardware can be used to mount performance-degradation attacks. However, in most cases, such attacks offer little benefit for the adversary. In this paper, we demonstrate that software-based performancedegradation attacks can be used to amplify side-channel leaks, enabling the adversary to increase both the amount and the quality of information captured. We identify a new information leak in the OpenSSL implementation of the ECDSA digital signature algorithm, albeit seemingly unexploitable due to the limited granularity of previous trace procurement techniques. To overcome this imposing hurdle, we combine the information leak with a microarchitectural performancedegradation attack that can slow victims down by a factor of over 150. We demonstrate how this combination enables the amplification of a side-channel sufficiently to exploit this new information leak. Using the combined attack, an adversary can break a private key of the secp256k1 curve, used in the Bitcoin protocol, after observing only 6 signatures-a four-fold improvement over all previously described attacks.-
dc.description.statementofresponsibilityThomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom-
dc.language.isoen-
dc.publisherACM New York-
dc.relation.ispartofseriesACM International Conference Proceeding Series-
dc.rights© 2016 Copyright held by the owner/author(s). Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).-
dc.source.urihttp://dx.doi.org/10.1145/2991079.2991084-
dc.titleAmplifying side channels through performance degradation-
dc.typeConference paper-
dc.contributor.conference32nd Annual Conference on Computer Security Applications (ACSAC '16) (5 Dec 2016 - 8 Dec 2016 : Los Angeles, California)-
dc.identifier.doi10.1145/2991079.2991084-
pubs.publication-statusPublished-
dc.identifier.orcidFalkner, K. [0000-0003-0309-4332]-
dc.identifier.orcidYarom, Y. [0000-0003-0401-4197]-
Appears in Collections:Aurora harvest 8
Computer Science publications

Files in This Item:
File Description SizeFormat 
RA_hdl_107842.pdf
  Restricted Access
Restricted Access301.72 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.