个人信息
王箭
招生学科专业:
计算机科学与技术 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
软件工程 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
网络空间安全 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
电子信息 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
联系方式:wangjian@nuaa.edu.cn 学位:工学博士学位

个人信息 Personal information

学历:南京大学 所在单位:计算机科学与技术学院/人工智能学院/软件学院 办公地点:计算机学院332室 电子邮箱:

Recovering memory access sequence with differential flush+reload attack

点击次数: 所属单位:计算机科学与技术学院/人工智能学院/软件学院 发表刊物:Lect. Notes Comput. Sci. 摘要:Side-channel attacks are effective attacks against modern cryptographic schemes, which exploit the leaking information besides input and output to the algorithm. As one of the cache-based side-channel attacks, Flush+Reload features high resolution, low noise, and virtual machine compatibility. However, a state-of-the-art Flush+Reload attack only reveals whether the memory address is accessed or not. This paper presents differential Flush+Reload attack that can recover the access sequence of memory addresses, which could lead to new vulnerabilities. The idea is to analyze statistical difference among multiple Flush+Reload results. Specifically, we add controlled delay between the start of victim calculation and the memory flush. Multiple Flush+Reload results with different delays are measured to determine the memory access sequence. Under this concept, we demonstrate the details of a successful recovery of T-table access sequences for an AES implementation from MatrixSSL version 3.9.3 on an Intel CPU. © Springer Nature Switzerland AG 2018. ISSN号:0302-9743 是否译文: 发表时间:2018-01-01 合写作者:Yuan, Zhiwei,Li, Yang,Sakiyama, Kazuo,Sugawara, Takeshi 通讯作者:王箭