PPT-Thwarting cache-based side-channel attacks
Author : myesha-ticknor | Published Date : 2017-06-26
Yuval Yarom The University of Adelaide and Data61 The binary search needs to be done in constant time to avoid timing issue But its fast so theres no problem
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Thwarting cache-based side-channel attac..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Thwarting cache-based side-channel attacks: Transcript
Yuval Yarom The University of Adelaide and Data61 The binary search needs to be done in constant time to avoid timing issue But its fast so theres no problem An anonymous reviewer . Yinqian. Zhang (UNC-Chapel Hill). Ari . Juels. (RSA Labs) . Michael K. Reiter (UNC-Chapel Hill). Thomas . Ristenpart. (U Wisconsin-Madison). Motivation. Security Isolation by Virtualization. Virtualization Layer . Computer Security 2014. Background. An algorithm or software can be designed to be . provably secure. .. E.g. cryptosystems, small OS kernels, TPM modules, .... Involves proving that certain situations cannot arise. virtual machines in . cloud environment. Rohit . Kugaonkar. CMSC 601 Spring 2011. May 9. th. 2011. http://res.sys-con.com/story/dec09/1225058/Cloud%20security%20226.jpg. Cloud Computing. “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”.. Computer Security 2014. Background. An algorithm or software can be designed to be . provably secure. .. E.g. cryptosystems, small OS kernels, TPM modules, .... Involves proving that certain situations cannot arise. Yossi . Oren. , . Ofir. . Weisse. and . Avishai. Wool. HASP Workshop, Tel Aviv, July 2013. 1. Power. Power . Analysis Attacks. Given a . description of a crypto . device. , plaintexts, ciphertexts . a. rchitectural. Side-Channel Attacks. Part 2. Yuval Yarom. The University of Adelaide . and . Data61. 1. X86 L1 Cache. Tag. Set. Offset. 0. 6 5. 12 11. Tag,. Data. Sets. Ways. Stores fixed-size (64B) . Security. Electronic Design Contest - 2017. Outline. Overview . of modern cryptography . Modern hardware design practices. Example of Hardware Attacks. Introduction . to Side Channel . Analysis . Differential . Yinqian. Zhang (UNC-Chapel Hill). Ari . Juels. (RSA Labs) . Michael K. Reiter (UNC-Chapel Hill). Thomas . Ristenpart. (U Wisconsin-Madison). Motivation. Security Isolation by Virtualization. Virtualization Layer . Defending . Against Cache-Based Side Channel . Attacks. Mengjia. Yan, . Bhargava. . Gopireddy. , Thomas Shull, . Josep Torrellas. University of Illinois at Urbana-Champaign. http://. iacoma.cs.uiuc.edu. Dynamic Software Diversity. Presented by . Xianchen. . Meng. Background. Side-Channel Attacks. Definition:. In cryptography, a . side-channel attack. is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force . Yuval Yarom. The University of Adelaide . and . Data61. 1. Publications on . microarchitectural. timing attacks. Data from [GYCH16]. 2. Publications and Global . Temperature. 3. Global Average Temperatures Vs. Number of Pirates. Mengjia Yan, Yasser . Shalabi. , . Josep. . Torrellas. University of Illinois at Urbana-Champaign. http://. iacoma.cs.uiuc.edu. MICRO October 2016. Motivation. Cache-based covert channel attacks. Communicate through cache conflicts. Side channel attacks and defenses. Presented by:. Kazi. . Mejbaul. Islam. Introduction and Background. Microarchitecture. Cache hierarchy. Side channels in microarchitecture. Threats in parallel and distributed systems. TrustZone. Defense on ARM Platform. Naiwei Liu, . Wanyu. . zang. , Meng . yu. , Ravi . SANdhu. UTSA ICS lab; Roosevelt university. Contents. Abstract and Introduction. Related Work. Cache-Based Security Threats and Attack.
Download Document
Here is the link to download the presentation.
"Thwarting cache-based side-channel attacks"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents