On the Applicability of Time-Driven Cache Attacks on Mobile Devices

Raphael Spreitzer, Thomas Plos

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop computers. Recently, investigations of such attacks on specific testbeds with processors that are employed in mobile devices have been done. In this work we investigate the applicability of Bernstein's timing attack and the cache-collision attack by Bogdanov et al. in real environments on three state-of-the-art mobile devices: an Acer Iconia A510, a Google Nexus S, and a Samsung Galaxy SIII. We show that T-table based implementations of the Advanced Encryption Standard (AES) leak enough timing information on these devices in order to recover parts of the used secret key using Bernstein's timing attack. We also show that systems with a cache-line size larger than 32 bytes exacerbate the cache-collision attack of Bogdanov et al.
Original languageEnglish
Title of host publicationNetwork and System Security
Subtitle of host publication7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer
Pages656-662
ISBN (Print)978-3-642-38630-5
DOIs
Publication statusPublished - 2013
Event7th International Conference on Network and System Security: NSS 2013 - Madrid, Spain
Duration: 3 Jun 20134 Jun 2013

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume7873

Conference

Conference7th International Conference on Network and System Security
Abbreviated titleNSS 2013
Country/TerritorySpain
CityMadrid
Period3/06/134/06/13

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • SeCoS - Secure Contactless Sphere - Smart RFID-Technologies for a Connected World

    Bösch, W. (Co-Investigator (CoI)), Wenger, E. (Co-Investigator (CoI)), Khan, H. N. (Co-Investigator (CoI)), Schmidt, J.-M. (Co-Investigator (CoI)), Gadringer, M. E. (Co-Investigator (CoI)), Spreitzer, R. C. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)), Gruss, D. (Co-Investigator (CoI)), Hutter, M. (Co-Investigator (CoI)), Freidl, P. F. (Co-Investigator (CoI)), Görtschacher, L. J. (Co-Investigator (CoI)), Mangard, S. (Co-Investigator (CoI)) & Grosinger, J. (Co-Investigator (CoI))

    1/01/1331/12/15

    Project: Research project

  • FWF - ReSIT - Realizing a Secure Internet of Things

    Hutter, M. (Co-Investigator (CoI)), Wenger, E. (Co-Investigator (CoI)), Schmidt, J.-M. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)), Mangard, S. (Co-Investigator (CoI)) & Posch, R. (Principal Investigator (PI))

    1/07/1231/12/14

    Project: Research project

  • IMPA Lab

    Posch, R. (Co-Investigator (CoI)), Rijmen, V. (Co-Investigator (CoI)), Posch, K.-C. (Co-Investigator (CoI)), Kirschbaum, M. (Co-Investigator (CoI)), Schmidt, J.-M. (Co-Investigator (CoI)), Schläffer, M. (Co-Investigator (CoI)), Szekely, A. (Co-Investigator (CoI)), Medwed, M. (Co-Investigator (CoI)), Plos, T. (Co-Investigator (CoI)), Peßl, P. (Co-Investigator (CoI)), Aigner, M. J. (Co-Investigator (CoI)), Wenger, E. (Co-Investigator (CoI)), Dominikus, S. (Co-Investigator (CoI)), Feldhofer, M. (Co-Investigator (CoI)), Hutter, M. (Co-Investigator (CoI)) & Oswald, M. E. (Co-Investigator (CoI))

    1/10/9915/07/19

    Project: Research area

Cite this