Essays about: "Cache attack"

Showing result 1 - 5 of 6 essays containing the words Cache attack.

  1. 1. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Xiaoyue Chen; [2022]
    Keywords : ;

    Abstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE

  2. 2. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Clara Tillman; [2021]
    Keywords : ;

    Abstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE

  3. 3. Evaluating APS Ecosystem Security : Novel IoT Enabled Medical Platform for Diabetes Patients

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Batuhan Ceylan; [2020]
    Keywords : security; medical device; penetration testing; web application; IoT; säkerhet; medicinsk IoT; penetrationstest; webbapplikation;

    Abstract : Computing technology has been getting more reliable and cheaper every year for the past several decades. Consequently, IoT devices have now become a part of medical technology. One example of this is a new open-source technology that has emerged for type-1 diabetes patients, which regulates the patients’ blood glucose levels. READ MORE

  4. 4. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sai Prashanth Josyula; [2015]
    Keywords : Digital signatures; Elliptic curve cryptography; GLV method; Side-channel attack;

    Abstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE

  5. 5. Micro-architectural Attacks and Countermeasures

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Shiting Lu; [2011]
    Keywords : Cache attack; AES; countermeasures; side channel; security;

    Abstract : Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new area focuses on the effects of common processor components and their functionalities on the security of software cryptosystems. READ MORE