搜索结果: 1-15 共查到“军事学 Cache”相关记录43条 . 查询时间(0.067 秒)
Modern cryptography requires the ability to securely generate pseudorandom numbers. However, despite decades of work on side channel attacks, there is little discussion of their application to pseudor...
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
implementation information hiding
2019/4/22
Cross-core last-level cache (LLC) eviction based sidechannel
attacks are becoming practical because of the inclusive
nature of shared resources (e.g., an inclusive LLC), that creates
back-invalidat...
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
TLS Bleichenbacher Side-channels
2018/12/3
Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible source...
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
secure processor cache timing attack cache partitioning
2018/5/11
Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
Drive-by Key-Extraction Cache Attacks from Portable Code
Side-channel attack cache attack web page confinement
2018/2/1
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU...
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
cache side channels lattice-based signature schemes program analysis
2017/9/28
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent...
Cache-Oblivious and Data-Oblivious Sorting and Applications
cache oblivious algorithms data oblivious algorithms ORAM
2017/9/25
Although external-memory sorting has been a classical algorithms abstraction and has been heavily studied in the literature, perhaps somewhat surprisingly, when data-obliviousness is a requirement, ev...
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
AES access-driven cache attacks
2017/9/21
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES...
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enf...
Cache-Base Application Detection in the Cloud Using Machine Learning
Cache Machine Learning Cloud
2017/3/21
Cross-VM attacks have emerged as a major threat on commercial clouds. These attacks commonly exploit hardware level leakages on shared physical servers. A co-located machine can readily feel the prese...
Statistical Analysis for Access-Driven Cache Attacks Against AES
AES side-channel analysis access-driven cache attacks
2016/12/8
In recent years, side-channel timing attacks utilizing architectural
behavior have been applied to cloud settings, presenting a realistic
and serious cyber threat. Access-driven cache attacks allow ...
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
side channel attack cache TrustZone
2016/12/8
As smart, embedded devices are increasingly integrated into our daily life, the security of these devices has become a major concern. The ARM processor family, which powers more than 60% of embedded d...
Cache Attacks Enable Bulk Key Recovery on the Cloud
Amazon EC2 Co-location Detection RSA key recovery
2016/6/8
Cloud services keep gaining popularity despite the security concerns. While non-sensitive data is easily trusted to cloud, security critical data and applications are not. The main concern with the cl...