Towards More Practical Time-Driven Cache Attacks

Raphael Spreitzer, Benoit Gérard

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review


Side-channel attacks are usually performed by employing the "divide-and-conquer" approach, meaning that leaking information is collected in a divide step, and later on exploited in the conquer step. The idea is to extract as much information as possible during the divide step, and to exploit the gathered information as efficiently as possible within the conquer step.
Focusing on both of these steps, we discuss potential enhancements of Bernstein's cache-timing attack against the Advanced Encryption Standard (AES). Concerning the divide part, we analyze the impact of attacking different key-chunk sizes, aiming at the extraction of more information from the overall encryption time. Furthermore, we analyze the most recent improvement of time-driven cache attacks, presented by Aly and ElGayyar, according to its applicability on ARM Cortex-A platforms. For the conquer part, we employ the optimal key-enumeration algorithm as proposed by Veyrat-Charvillon et al. to significantly reduce the complexity of the exhaustive key-search phase compared to the currently employed threshold-based approach. This in turn leads to more practical attacks. Additionally, we provide extensive experimental results of the proposed enhancements on two Android-based smartphones, namely a Google Nexus S and a Samsung Galaxy SII.
Original languageEnglish
Title of host publicationInformation Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings.
EditorsDavid Naccache, Damien Sauveron
ISBN (Print)978-3-662-43825-1
Publication statusPublished - 2014
EventWorkshop in Information Security Theory and Practices - Heraklion, Greece
Duration: 30 Jun 20142 Jul 2014

Publication series

NameLecture Notes in Computer Science


ConferenceWorkshop in Information Security Theory and Practices

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Cite this