军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-14 共查到密码学 Cache Attacks相关记录14条 . 查询时间(0.05 秒)
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG     pseudorandom number generators  AES       font style='font-size:12px;'> 2019/9/5
Modern cryptography requires the ability to securely generate pseudorandom numbers. However, despite decades of work on side channel attacks, there is little discussion of their application to pseudor...
Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible source...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU...
CacheZoom: How SGX Amplifies The Power of Cache Attacks     Intel SGX  Cache Attacks  AES       font style='font-size:12px;'> 2017/6/28
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enf...
In recent years, side-channel timing attacks utilizing architectural behavior have been applied to cloud settings, presenting a realistic and serious cyber threat. Access-driven cache attacks allow ...
Cache Attacks Enable Bulk Key Recovery on the Cloud     Amazon EC2  Co-location Detection  RSA key recovery       font style='font-size:12px;'> 2016/6/8
Cloud services keep gaining popularity despite the security concerns. While non-sensitive data is easily trusted to cloud, security critical data and applications are not. The main concern with the cl...
Cross Processor Cache Attacks     Invalidate+Transfer  Cross-CPU attack  HyperTransport       font style='font-size:12px;'> 2015/12/21
Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant cloud servers to low-power mobile platforms. The denser integration...
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop computers. Recently, also investigations of such attacks on testbeds with processors that are emplo...
In this paper we analyze the case of AES and present an attack which is capable of recovering the full secret key in almost realtime for AES-128, requiring only a very limited number of observed encry...
Cache Attacks and Countermeasures: the Case of AES     side-channel attack  cache  memory access  cryptanalysis       font style='font-size:12px;'> 2009/2/25
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. This leakage reveals memory access patterns, which can be used for cryptan...
Trace-Driven Cache Attacks on AES     Side-channel cryptanalysis  cache attacks  trace-driven attacks  AES       font style='font-size:12px;'> 2008/11/14
Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present efficient trace-driven cache attacks on a wide...
Analysis of countermeasures against access driven cache attacks on AES     cache attacks  AES  threat model       font style='font-size:12px;'> 2008/8/14
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models for tampering or sid...
Larger key lengths translate into an exponential increase in the complexity of an exhaustive search. Side-channel attacks, however, use a divide-and-conquer approach and hence it is generally assumed ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...