Published February 2011 | Version v1
Conference paper Open

Cache-Timing Attacks and Shared Contexts

  • 1. ROR icon Aalto University

Abstract (English)

Cache-timing attacks recover algorithm state by exploiting the fact that the latency of retrieving data from memory is essentially governed by the availability of said data in the processor’s cache. Efficient and effective countermeasures to these attacks are needed. A shared memory context is a mechanism for reusing dynamically allocated memory. Focusing on public key cryptography within OpenSSL and its implementation of shared contexts, this paper examines the ability of a shared context to aid in mitigation of cache-timing attacks. The results are pessimistic towards this approach.

Files

cosade2011_talk22_paper.pdf

Files (1.2 MB)

Name Size Download all
md5:7ee162042f581b218b16306557c3d5aa
472.2 kB Preview Download
md5:a2cef04afa84e70b866d4b9d2595da59
692.5 kB Preview Download

Additional details

Identifiers

URL
https://researchportal.tuni.fi/en/publications/cache-timing-attacks-and-shared-contexts
Other
https://web.archive.org/web/20170809094030/http://cosade2011.cased.de/files/2011/cosade2011_talk22_paper.pdf

Funding

European Commission
CACE (EU FP7 Grant) ICT-2007-216499