Abstract
When a load instruction incurs a cache-miss, a block of memory from the lower level of the memory subsystem is loaded into a cache line. Consequently, the memory access would require considerably more time and power, and has a characteristically different electromagnetic radiation compared to when a cache-hit occurs. The loads that result in cache misses are easily distinguishable from the cache hits. These indirect manifestations of a memory access can be used by an attacker to gain considerable insight about the application currently being executed. In this chapter, we show how information about the secret key of a cipher can be gleaned from the execution time of a block cipher. We start the chapter with a simple illustration showing how information can be obtained from memory access patterns before discussing attacks on ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bertoni G, Zaccaria V, Breveglieri L, Monchiero M, Palermo G (2005) “AES Power Attack Based on Induced Cache Miss and Countermeasure,” in ITCC (1). IEEE Computer Society, pp 586–591
Lauradoux C (2005) Collision attacks on processors with cache and countermeasures. In: Wolf C, Lucks S, Yau P-W (eds) WEWoRC, ser. LNI, vol 74. GI, pp 76–85
Fournier JJA, Tunstall M (2006) Cache based power analysis attacks on AES. In: Batten LM, Safavi-Naini R (eds) ACISP, ser. Lecture notes in computer science, vol 4058. Springer, pp 17–28
Bonneau J, Mironov I (2006) Cache-Collision timing attacks against AES. In: Goubin L, Matsui M (eds) CHES, ser. Lecture notes in computer science, vol 4249. Springer, pp 201–215
Aciiçmez O, Koç ÇK (2006) Trace-driven cache attacks on AES (Short Paper). In: Ning P, Qing S, Li N (eds) ICICS, ser. Lecture notes in computer science, vol 4307. Springer, pp 112–121
Page D (2002) Theoretical use of cache memory as a cryptanalytic side-channel. Departement of Computer Science, University of Bristol, Tech. Rep. http://eprint.iacr.org/2002/169
Tsunoo Y, Tsujihara E, Minematsu K, Miyauchi H (2002) Cryptanalysis of block ciphers implemented on computers with cache. In International Symposium on Information Theory and Its Applications, pp 803–806
Tsunoo Y, Saito T, Suzaki T, Shigeri M, Miyauchi H (2003) Cryptanalysis of DES Implemented on Computers with Cache. In: Walter CD, Kaya Koç Ç, Paar C (eds) CHES, ser. Lecture notes in computer science, vol 2779. Springer, pp 62–76
Aciiçmez O, Schindler W, Koç ÇK (2007) Cache based remote timing attack on the AES. In: Abe M (ed) CT-RSA, ser. Lecture notes in computer science, vol 4377. Springer, pp 271–286
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (2015). Time-Driven Cache Attacks. In: Timing Channels in Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-12370-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-12370-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12369-1
Online ISBN: 978-3-319-12370-7
eBook Packages: EngineeringEngineering (R0)