Paper 2007/164

Yet Another MicroArchitectural Attack: Exploiting I-cache

Onur Aciicmez

Abstract

MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis, exploit microarchitectural functionalities of processor implementations and can compromise the security of computational environments even in the presence of sophisticated protection mechanisms like virtualization and sandboxing. This newly evolving research area has attracted significant interest due to the broad application range and the potentials of these attacks. Cache Analysis and Branch Prediction Analysis were the only types of MA that had been known publicly. In this paper, we introduce Instruction Cache (I-Cache) as yet another source of MA and present our experimental results which clearly prove the practicality and danger of I-Cache Attacks.

Note: Will appear at ACM-CCS CSAW

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Instruction CacheModular ExponentiationMontgomery MultiplicationRSASide Channel AnalysisMicroArchitectural Analysis
Contact author(s)
onur aciicmez @ gmail com
History
2007-08-16: revised
2007-05-07: received
See all versions
Short URL
https://ia.cr/2007/164
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/164,
      author = {Onur Aciicmez},
      title = {Yet Another {MicroArchitectural} Attack: Exploiting I-cache},
      howpublished = {Cryptology {ePrint} Archive, Paper 2007/164},
      year = {2007},
      url = {https://eprint.iacr.org/2007/164}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.