2006
DOI: 10.1007/11935308_9
|View full text |Cite
|
Sign up to set email alerts
|

Trace-Driven Cache Attacks on AES (Short Paper)

Abstract: Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem. We also evaluate the cost of the proposed attack in detail under the assumption of a noiseless environment. We develop an accurate mathematical model that we use in the cost analysis of our attack. We use two different metrics, specifically, the expected number of ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
102
0
1

Year Published

2006
2006
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 115 publications
(103 citation statements)
references
References 15 publications
(25 reference statements)
0
102
0
1
Order By: Relevance
“…The above abstract model can help us to understand the TDCA problem and is generic to block ciphers using the S-Box (table) lookup structure [4,5,6,7,8,9,10,11,24,25,26,27,28]. Different attack techniques can be developed to solve this problem, such as traditional TDCA technique [4,5,6,7,8,9,10,11], MDASCA technique [18] or others to be proposed in the future.…”
Section: The Tdca Problemmentioning
confidence: 99%
See 4 more Smart Citations
“…The above abstract model can help us to understand the TDCA problem and is generic to block ciphers using the S-Box (table) lookup structure [4,5,6,7,8,9,10,11,24,25,26,27,28]. Different attack techniques can be developed to solve this problem, such as traditional TDCA technique [4,5,6,7,8,9,10,11], MDASCA technique [18] or others to be proposed in the future.…”
Section: The Tdca Problemmentioning
confidence: 99%
“…Cache attacks demonstrated fall into three categories, depending on the channels used to collect the leakages. These channels are spy processes [1], timing information [2,3] and power/electromagnetic (EM) traces [4,5,6,7,8,9,10,11]. The focus of this paper is trace driven cache attack (TDCA), which exploits the power or electromagnetic traces.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations