International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Yet Another MicroArchitectural Attack: Exploiting I-cache

Authors:
Onur Aciicmez
Download:
URL: http://eprint.iacr.org/2007/164
Search ePrint
Search Google
Abstract: MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel Analysis, exploit microarchitectural functionalities of processor implementations and can compromise the security of computational environments even in the presence of sophisticated protection mechanisms like virtualization and sandboxing. This newly evolving research area has attracted significant interest due to the broad application range and the potentials of these attacks. Cache Analysis and Branch Prediction Analysis were the only types of MA that had been known publicly. In this paper, we introduce Instruction Cache (I-Cache) as yet another source of MA and present our experimental results which clearly prove the practicality and danger of I-Cache Attacks.
BibTeX
@misc{eprint-2007-13446,
  title={Yet Another MicroArchitectural Attack: Exploiting I-cache},
  booktitle={IACR Eprint archive},
  keywords={implementation / Instruction Cache, Modular Exponentiation, Montgomery Multiplication, RSA, Side Channel Analysis, MicroArchitectural Analysis},
  url={http://eprint.iacr.org/2007/164},
  note={ onur.aciicmez@gmail.com 13741 received 3 May 2007, last revised 16 Aug 2007},
  author={Onur Aciicmez},
  year=2007
}