Paper 2007/164
Yet Another MicroArchitectural Attack: Exploiting I-cache
Onur Aciicmez
Abstract
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis, exploit microarchitectural functionalities of processor implementations and can compromise the security of computational environments even in the presence of sophisticated protection mechanisms like virtualization and sandboxing. This newly evolving research area has attracted significant interest due to the broad application range and the potentials of these attacks. Cache Analysis and Branch Prediction Analysis were the only types of MA that had been known publicly. In this paper, we introduce Instruction Cache (I-Cache) as yet another source of MA and present our experimental results which clearly prove the practicality and danger of I-Cache Attacks.
Note: Will appear at ACM-CCS CSAW
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Instruction CacheModular ExponentiationMontgomery MultiplicationRSASide Channel AnalysisMicroArchitectural Analysis
- Contact author(s)
- onur aciicmez @ gmail com
- History
- 2007-08-16: revised
- 2007-05-07: received
- See all versions
- Short URL
- https://ia.cr/2007/164
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2007/164, author = {Onur Aciicmez}, title = {Yet Another {MicroArchitectural} Attack: Exploiting I-cache}, howpublished = {Cryptology {ePrint} Archive, Paper 2007/164}, year = {2007}, url = {https://eprint.iacr.org/2007/164} }