Non deterministic caches: a simple and effective defense against side channel attacks
Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce inform...
Ausführliche Beschreibung
Autor*in: |
Keramidas, G. [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2008 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media, LLC 2008 |
---|
Übergeordnetes Werk: |
Enthalten in: Design automation for embedded systems - Springer US, 1996, 12(2008), 3 vom: 26. Apr., Seite 221-230 |
---|---|
Übergeordnetes Werk: |
volume:12 ; year:2008 ; number:3 ; day:26 ; month:04 ; pages:221-230 |
Links: |
---|
DOI / URN: |
10.1007/s10617-008-9018-y |
---|
Katalog-ID: |
OLC202705362X |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC202705362X | ||
003 | DE-627 | ||
005 | 20230503034637.0 | ||
007 | tu | ||
008 | 200819s2008 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s10617-008-9018-y |2 doi | |
035 | |a (DE-627)OLC202705362X | ||
035 | |a (DE-He213)s10617-008-9018-y-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |a 690 |q VZ |
100 | 1 | |a Keramidas, G. |e verfasserin |4 aut | |
245 | 1 | 0 | |a Non deterministic caches: a simple and effective defense against side channel attacks |
264 | 1 | |c 2008 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media, LLC 2008 | ||
520 | |a Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. | ||
650 | 4 | |a Side channel cryptanalysis | |
650 | 4 | |a Side channel attack | |
650 | 4 | |a Cache attack | |
650 | 4 | |a Cache decay | |
700 | 1 | |a Antonopoulos, A. |4 aut | |
700 | 1 | |a Serpanos, D. N. |4 aut | |
700 | 1 | |a Kaxiras, S. |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Design automation for embedded systems |d Springer US, 1996 |g 12(2008), 3 vom: 26. Apr., Seite 221-230 |w (DE-627)191069248 |w (DE-600)1293324-7 |w (DE-576)054257751 |x 0929-5585 |7 nnns |
773 | 1 | 8 | |g volume:12 |g year:2008 |g number:3 |g day:26 |g month:04 |g pages:221-230 |
856 | 4 | 1 | |u https://doi.org/10.1007/s10617-008-9018-y |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-UMW | ||
912 | |a SSG-OLC-ARC | ||
912 | |a SSG-OLC-TEC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4324 | ||
951 | |a AR | ||
952 | |d 12 |j 2008 |e 3 |b 26 |c 04 |h 221-230 |
author_variant |
g k gk a a aa d n s dn dns s k sk |
---|---|
matchkey_str |
article:09295585:2008----::odtriitcahssmladfetvdfnegis |
hierarchy_sort_str |
2008 |
publishDate |
2008 |
allfields |
10.1007/s10617-008-9018-y doi (DE-627)OLC202705362X (DE-He213)s10617-008-9018-y-p DE-627 ger DE-627 rakwb eng 004 690 VZ Keramidas, G. verfasserin aut Non deterministic caches: a simple and effective defense against side channel attacks 2008 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2008 Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. Side channel cryptanalysis Side channel attack Cache attack Cache decay Antonopoulos, A. aut Serpanos, D. N. aut Kaxiras, S. aut Enthalten in Design automation for embedded systems Springer US, 1996 12(2008), 3 vom: 26. Apr., Seite 221-230 (DE-627)191069248 (DE-600)1293324-7 (DE-576)054257751 0929-5585 nnns volume:12 year:2008 number:3 day:26 month:04 pages:221-230 https://doi.org/10.1007/s10617-008-9018-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-UMW SSG-OLC-ARC SSG-OLC-TEC SSG-OLC-MAT GBV_ILN_65 GBV_ILN_70 GBV_ILN_120 GBV_ILN_2020 GBV_ILN_4307 GBV_ILN_4324 AR 12 2008 3 26 04 221-230 |
spelling |
10.1007/s10617-008-9018-y doi (DE-627)OLC202705362X (DE-He213)s10617-008-9018-y-p DE-627 ger DE-627 rakwb eng 004 690 VZ Keramidas, G. verfasserin aut Non deterministic caches: a simple and effective defense against side channel attacks 2008 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2008 Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. Side channel cryptanalysis Side channel attack Cache attack Cache decay Antonopoulos, A. aut Serpanos, D. N. aut Kaxiras, S. aut Enthalten in Design automation for embedded systems Springer US, 1996 12(2008), 3 vom: 26. Apr., Seite 221-230 (DE-627)191069248 (DE-600)1293324-7 (DE-576)054257751 0929-5585 nnns volume:12 year:2008 number:3 day:26 month:04 pages:221-230 https://doi.org/10.1007/s10617-008-9018-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-UMW SSG-OLC-ARC SSG-OLC-TEC SSG-OLC-MAT GBV_ILN_65 GBV_ILN_70 GBV_ILN_120 GBV_ILN_2020 GBV_ILN_4307 GBV_ILN_4324 AR 12 2008 3 26 04 221-230 |
allfields_unstemmed |
10.1007/s10617-008-9018-y doi (DE-627)OLC202705362X (DE-He213)s10617-008-9018-y-p DE-627 ger DE-627 rakwb eng 004 690 VZ Keramidas, G. verfasserin aut Non deterministic caches: a simple and effective defense against side channel attacks 2008 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2008 Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. Side channel cryptanalysis Side channel attack Cache attack Cache decay Antonopoulos, A. aut Serpanos, D. N. aut Kaxiras, S. aut Enthalten in Design automation for embedded systems Springer US, 1996 12(2008), 3 vom: 26. Apr., Seite 221-230 (DE-627)191069248 (DE-600)1293324-7 (DE-576)054257751 0929-5585 nnns volume:12 year:2008 number:3 day:26 month:04 pages:221-230 https://doi.org/10.1007/s10617-008-9018-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-UMW SSG-OLC-ARC SSG-OLC-TEC SSG-OLC-MAT GBV_ILN_65 GBV_ILN_70 GBV_ILN_120 GBV_ILN_2020 GBV_ILN_4307 GBV_ILN_4324 AR 12 2008 3 26 04 221-230 |
allfieldsGer |
10.1007/s10617-008-9018-y doi (DE-627)OLC202705362X (DE-He213)s10617-008-9018-y-p DE-627 ger DE-627 rakwb eng 004 690 VZ Keramidas, G. verfasserin aut Non deterministic caches: a simple and effective defense against side channel attacks 2008 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2008 Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. Side channel cryptanalysis Side channel attack Cache attack Cache decay Antonopoulos, A. aut Serpanos, D. N. aut Kaxiras, S. aut Enthalten in Design automation for embedded systems Springer US, 1996 12(2008), 3 vom: 26. Apr., Seite 221-230 (DE-627)191069248 (DE-600)1293324-7 (DE-576)054257751 0929-5585 nnns volume:12 year:2008 number:3 day:26 month:04 pages:221-230 https://doi.org/10.1007/s10617-008-9018-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-UMW SSG-OLC-ARC SSG-OLC-TEC SSG-OLC-MAT GBV_ILN_65 GBV_ILN_70 GBV_ILN_120 GBV_ILN_2020 GBV_ILN_4307 GBV_ILN_4324 AR 12 2008 3 26 04 221-230 |
allfieldsSound |
10.1007/s10617-008-9018-y doi (DE-627)OLC202705362X (DE-He213)s10617-008-9018-y-p DE-627 ger DE-627 rakwb eng 004 690 VZ Keramidas, G. verfasserin aut Non deterministic caches: a simple and effective defense against side channel attacks 2008 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2008 Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. Side channel cryptanalysis Side channel attack Cache attack Cache decay Antonopoulos, A. aut Serpanos, D. N. aut Kaxiras, S. aut Enthalten in Design automation for embedded systems Springer US, 1996 12(2008), 3 vom: 26. Apr., Seite 221-230 (DE-627)191069248 (DE-600)1293324-7 (DE-576)054257751 0929-5585 nnns volume:12 year:2008 number:3 day:26 month:04 pages:221-230 https://doi.org/10.1007/s10617-008-9018-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-UMW SSG-OLC-ARC SSG-OLC-TEC SSG-OLC-MAT GBV_ILN_65 GBV_ILN_70 GBV_ILN_120 GBV_ILN_2020 GBV_ILN_4307 GBV_ILN_4324 AR 12 2008 3 26 04 221-230 |
language |
English |
source |
Enthalten in Design automation for embedded systems 12(2008), 3 vom: 26. Apr., Seite 221-230 volume:12 year:2008 number:3 day:26 month:04 pages:221-230 |
sourceStr |
Enthalten in Design automation for embedded systems 12(2008), 3 vom: 26. Apr., Seite 221-230 volume:12 year:2008 number:3 day:26 month:04 pages:221-230 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Side channel cryptanalysis Side channel attack Cache attack Cache decay |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Design automation for embedded systems |
authorswithroles_txt_mv |
Keramidas, G. @@aut@@ Antonopoulos, A. @@aut@@ Serpanos, D. N. @@aut@@ Kaxiras, S. @@aut@@ |
publishDateDaySort_date |
2008-04-26T00:00:00Z |
hierarchy_top_id |
191069248 |
dewey-sort |
14 |
id |
OLC202705362X |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC202705362X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503034637.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2008 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10617-008-9018-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC202705362X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10617-008-9018-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">690</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Keramidas, G.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Non deterministic caches: a simple and effective defense against side channel attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2008</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC 2008</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Side channel cryptanalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Side channel attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cache attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cache decay</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Antonopoulos, A.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Serpanos, D. N.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaxiras, S.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Design automation for embedded systems</subfield><subfield code="d">Springer US, 1996</subfield><subfield code="g">12(2008), 3 vom: 26. Apr., Seite 221-230</subfield><subfield code="w">(DE-627)191069248</subfield><subfield code="w">(DE-600)1293324-7</subfield><subfield code="w">(DE-576)054257751</subfield><subfield code="x">0929-5585</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:12</subfield><subfield code="g">year:2008</subfield><subfield code="g">number:3</subfield><subfield code="g">day:26</subfield><subfield code="g">month:04</subfield><subfield code="g">pages:221-230</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10617-008-9018-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-UMW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-ARC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">12</subfield><subfield code="j">2008</subfield><subfield code="e">3</subfield><subfield code="b">26</subfield><subfield code="c">04</subfield><subfield code="h">221-230</subfield></datafield></record></collection>
|
author |
Keramidas, G. |
spellingShingle |
Keramidas, G. ddc 004 misc Side channel cryptanalysis misc Side channel attack misc Cache attack misc Cache decay Non deterministic caches: a simple and effective defense against side channel attacks |
authorStr |
Keramidas, G. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)191069248 |
format |
Article |
dewey-ones |
004 - Data processing & computer science 690 - Buildings |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0929-5585 |
topic_title |
004 690 VZ Non deterministic caches: a simple and effective defense against side channel attacks Side channel cryptanalysis Side channel attack Cache attack Cache decay |
topic |
ddc 004 misc Side channel cryptanalysis misc Side channel attack misc Cache attack misc Cache decay |
topic_unstemmed |
ddc 004 misc Side channel cryptanalysis misc Side channel attack misc Cache attack misc Cache decay |
topic_browse |
ddc 004 misc Side channel cryptanalysis misc Side channel attack misc Cache attack misc Cache decay |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Design automation for embedded systems |
hierarchy_parent_id |
191069248 |
dewey-tens |
000 - Computer science, knowledge & systems 690 - Building & construction |
hierarchy_top_title |
Design automation for embedded systems |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)191069248 (DE-600)1293324-7 (DE-576)054257751 |
title |
Non deterministic caches: a simple and effective defense against side channel attacks |
ctrlnum |
(DE-627)OLC202705362X (DE-He213)s10617-008-9018-y-p |
title_full |
Non deterministic caches: a simple and effective defense against side channel attacks |
author_sort |
Keramidas, G. |
journal |
Design automation for embedded systems |
journalStr |
Design automation for embedded systems |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 600 - Technology |
recordtype |
marc |
publishDateSort |
2008 |
contenttype_str_mv |
txt |
container_start_page |
221 |
author_browse |
Keramidas, G. Antonopoulos, A. Serpanos, D. N. Kaxiras, S. |
container_volume |
12 |
class |
004 690 VZ |
format_se |
Aufsätze |
author-letter |
Keramidas, G. |
doi_str_mv |
10.1007/s10617-008-9018-y |
dewey-full |
004 690 |
title_sort |
non deterministic caches: a simple and effective defense against side channel attacks |
title_auth |
Non deterministic caches: a simple and effective defense against side channel attacks |
abstract |
Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. © Springer Science+Business Media, LLC 2008 |
abstractGer |
Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. © Springer Science+Business Media, LLC 2008 |
abstract_unstemmed |
Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks. © Springer Science+Business Media, LLC 2008 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-UMW SSG-OLC-ARC SSG-OLC-TEC SSG-OLC-MAT GBV_ILN_65 GBV_ILN_70 GBV_ILN_120 GBV_ILN_2020 GBV_ILN_4307 GBV_ILN_4324 |
container_issue |
3 |
title_short |
Non deterministic caches: a simple and effective defense against side channel attacks |
url |
https://doi.org/10.1007/s10617-008-9018-y |
remote_bool |
false |
author2 |
Antonopoulos, A. Serpanos, D. N. Kaxiras, S. |
author2Str |
Antonopoulos, A. Serpanos, D. N. Kaxiras, S. |
ppnlink |
191069248 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10617-008-9018-y |
up_date |
2024-07-03T13:35:29.880Z |
_version_ |
1803565116820553728 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC202705362X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503034637.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2008 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10617-008-9018-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC202705362X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10617-008-9018-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">690</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Keramidas, G.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Non deterministic caches: a simple and effective defense against side channel attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2008</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC 2008</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Side channel cryptanalysis has received significant attention lately, because it provides a low-cost and facile way to reveal the secret information held on a secure computing system. One particular type of side channel attacks, called cache-based side channel attacks, aims to deduce information about the state of a cryptographic algorithm or its key by observing the data-dependent behavior of a microprocessor’s cache memory. These attacks have been proven successful and very hard to protect against. In this paper, we introduce the use of the Cache Decay approach as an aid to guard against cache-based side channel attacks. Cache Decay controls the lifetime (called decay interval) of the cache items and was initially proposed for cache power leakage savings. By randomly selecting the decay interval of the cache, we actually create caches with non-deterministic behavior in regard to their statistics. Thus, as we demonstrate, multiple runs of the same algorithm (performing on the same input) will result in different cache statistics, defending against the attacker and reinforcing the protection offered by the system. In our work, we use a cycle-based processor simulator, enhanced with the required modifications, in order to evaluate our proposal and show that our technique can be used effectively to protect against cache-based side channel attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Side channel cryptanalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Side channel attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cache attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cache decay</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Antonopoulos, A.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Serpanos, D. N.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaxiras, S.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Design automation for embedded systems</subfield><subfield code="d">Springer US, 1996</subfield><subfield code="g">12(2008), 3 vom: 26. Apr., Seite 221-230</subfield><subfield code="w">(DE-627)191069248</subfield><subfield code="w">(DE-600)1293324-7</subfield><subfield code="w">(DE-576)054257751</subfield><subfield code="x">0929-5585</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:12</subfield><subfield code="g">year:2008</subfield><subfield code="g">number:3</subfield><subfield code="g">day:26</subfield><subfield code="g">month:04</subfield><subfield code="g">pages:221-230</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10617-008-9018-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-UMW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-ARC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">12</subfield><subfield code="j">2008</subfield><subfield code="e">3</subfield><subfield code="b">26</subfield><subfield code="c">04</subfield><subfield code="h">221-230</subfield></datafield></record></collection>
|
score |
7.397317 |