Published February 2011
| Version v1
Conference paper
Open
Cache-Timing Attacks and Shared Contexts
Abstract (English)
Cache-timing attacks recover algorithm state by exploiting the fact that the latency of retrieving data from memory is essentially governed by the availability of said data in the processor’s cache. Efficient and effective countermeasures to these attacks are needed. A shared memory context is a mechanism for reusing dynamically allocated memory. Focusing on public key cryptography within OpenSSL and its implementation of shared contexts, this paper examines the ability of a shared context to aid in mitigation of cache-timing attacks. The results are pessimistic towards this approach.
Files
cosade2011_talk22_paper.pdf
Files
(1.2 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:7ee162042f581b218b16306557c3d5aa
|
472.2 kB | Preview Download |
|
md5:a2cef04afa84e70b866d4b9d2595da59
|
692.5 kB | Preview Download |
Additional details
Identifiers
- URL
- https://researchportal.tuni.fi/en/publications/cache-timing-attacks-and-shared-contexts
- Other
- https://web.archive.org/web/20170809094030/http://cosade2011.cased.de/files/2011/cosade2011_talk22_paper.pdf