New Results on Instruction Cache Attacks

  • Onur Acıiçmez
  • Billy Bob Brumley
  • Philipp Grabher
Conference paper

DOI: 10.1007/978-3-642-15031-9_8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)
Cite this paper as:
Acıiçmez O., Brumley B.B., Grabher P. (2010) New Results on Instruction Cache Attacks. In: Mangard S., Standaert FX. (eds) Cryptographic Hardware and Embedded Systems, CHES 2010. CHES 2010. Lecture Notes in Computer Science, vol 6225. Springer, Berlin, Heidelberg


We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSL’s DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Onur Acıiçmez
    • 1
  • Billy Bob Brumley
    • 2
  • Philipp Grabher
    • 3
  1. 1.Samsung ElectronicsUSA
  2. 2.Aalto University School of Science and TechnologyFinland
  3. 3.University of BristolUK

Personalised recommendations