International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Eran Tromer

Affiliation: Tel Aviv University + Columbia

Publications

Year
Venue
Title
2017
EUROCRYPT
2017
JOFC
2017
JOFC
2015
EPRINT
2015
EPRINT
2015
EPRINT
2015
EPRINT
2015
EUROCRYPT
2015
CHES
2014
CRYPTO
2014
CRYPTO
2014
EPRINT
2014
EPRINT
2014
EPRINT
2014
CHES
2013
CRYPTO
2012
EUROCRYPT
2010
JOFC
2010
EUROCRYPT
2005
CHES
2005
TCC
2005
EPRINT
Cache attacks and Countermeasures: the Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups. The attacks allow an unprivileged process to attack other processes running in parallel on the same processor, despite partitioning methods such as memory protection, sandboxing and virtualization. Some of our methods require only the ability to trigger services that perform encryption or MAC using the unknown key, such as encrypted disk partitions or secure network links. Moreover, we demonstrate an extremely strong type of attack, which requires knowledge of neither the specific plaintexts nor ciphertexts, and works by merely monitoring the effect of the cryptographic process on the cache. We discuss in detail several such attacks on AES, and experimentally demonstrate their applicability to real systems, such as OpenSSL and Linux's dm-crypt encrypted partitions (in the latter case, the full key can be recovered after just 800 writes to the partition, taking 65 milliseconds). Finally, we describe several countermeasures which can be used to mitigate such attacks.
2003
ASIACRYPT
2003
CHES
2003
CRYPTO
2002
ASIACRYPT

Program Committees

Crypto 2019
Crypto 2017
Crypto 2012
Crypto 2009
Eurocrypt 2007