Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX
نویسندگان
چکیده
منابع مشابه
Hardware Based Strategies Against Side - Channel - Attack Implemented in WDDL
This contribution discusses cryptographic algorithm in hardware that protects the information leaks out of the device through so called „side channels“. Attacks on crypto-processors are based on analyses of the leaked data are known as sidechannel attacks (SCA). Important information, such as secret keys, can be obtained by observing the power consumption, the electromagnetic radiation, the tim...
متن کاملNew side-channel attack against scan chains
Insertion of scan chains is the most common technique to ensure observability and controllability of sequential elements in an IC. However, when the chip deals with secret information, the scan chain can be used as back door for accessing secret (or hidden) information, and thus jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown ...
متن کاملThe Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks
Protected-module architectures (PMAs) have been proposed to provide strong isolation guarantees, even on top of a compromised system. Unfortunately, Intel SGX – the only publicly available highend PMA – has been shown to only provide limited isolation. An attacker controlling the untrusted page tables, can learn enclave secrets by observing its page access patterns. Fortifying existing protecte...
متن کاملA Robust Electronic Voting Scheme Against Side Channel Attack
YI-NING LIU, WEI GUO, CHI CHENG, CHINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology Guilin, 541004 P.R. China School of Computer Science China University of Geosciences Wuhan, 430074 P.R. China Computer School Central China Normal University Wuhan, 430079 P.R. China College of Mathematics and Computer Science Fujian Normal...
متن کاملA Side-Channel Assisted Cryptanalytic Attack Against QcBits
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum computer attacks. It is a constanttime implementation for a quasi-cyclic moderate density parity check (QC-MDPC) Niederreiter encryption scheme, and has excellent performance and small key sizes. In this paper, we present a key recovery attack against QcBits. We first used differential power analys...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Cryptographic Hardware and Embedded Systems
سال: 2019
ISSN: 2569-2925
DOI: 10.46586/tches.v2020.i1.321-347