Trilochan: a solution to detect cross-VM direct timing attack

Author(s):  
Dhara H. Buch ◽  
Haresh S. Bhatt
Keyword(s):  
Science News ◽  
1995 ◽  
Vol 148 (25) ◽  
pp. 406
Author(s):  
I. Peterson

2014 ◽  
Vol 02 (04) ◽  
pp. 1-9
Author(s):  
A. H. A. Ghafar ◽  
M. R. K. Ariffin
Keyword(s):  

2021 ◽  
Vol 29 (0) ◽  
pp. 757-768
Author(s):  
Yuichiro Dan ◽  
Toshiki Shibahara ◽  
Junko Takahashi

10.29007/nwj8 ◽  
2019 ◽  
Author(s):  
Sebastien Carré ◽  
Victor Dyseryn ◽  
Adrien Facon ◽  
Sylvain Guilley ◽  
Thomas Perianin

Cache timing attacks are serious security threats that exploit cache memories to steal secret information.We believe that the identification of a sequence of operations from a set of cache-timing data measurements is not a trivial step when building an attack. We present a recurrent neural network model able to automatically retrieve a sequence of function calls from cache-timings. Inspired from natural language processing, our model is able to learn on partially labelled data. We use the model to unfold an end-to-end automated attack on OpenSSL ECDSA on the secp256k1 curve. Contrary to most research, we did not need human processing of the traces to retrieve relevant information.


Author(s):  
Helena Handschuh ◽  
Howard M. Heys
Keyword(s):  

Author(s):  
François Koeune
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document