Security, Privacy, and Applied Cryptography Engineering
8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings
Article
The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show that scatter–gather is not constant time. We implement a cache timing attack agains...
Book and Conference Proceedings
8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings
Article
Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud c...
Chapter and Conference Paper
The seminal work of Heninger and Shacham (Crypto 2009) demonstrated a method for reconstructing secret RSA keys from partial information of the key components. In this paper we further investigate this approa...