Skip to main content

and
  1. No Access

    Article

    A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

    Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud c...

    Qian Ge, Yuval Yarom, David Cock, Gernot Heiser in Journal of Cryptographic Engineering (2018)

  2. No Access

    Article

    CacheBleed: a timing attack on OpenSSL constant-time RSA

    The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show that scatter–gather is not constant time. We implement a cache timing attack agains...

    Yuval Yarom, Daniel Genkin, Nadia Heninger in Journal of Cryptographic Engineering (2017)