Abstract

Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar CPUs supporting a complete operating system. The difficulty of both assessing the vulnerability of a device to them, and validating the effectiveness of countermeasures is increasing as a consequence. In this work we prove that assessing the side-channel vulnerability of a software implementation running on a CPU should take into account the microarchitectural features of the CPU itself. We characterize the impact of microarchitectural features and prove the effectiveness of such an approach attacking a dual-core superscalar CPU.


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.1145/3195970.3196112 under the license http://www.acm.org/publications/policies/copyright_policy#Background
http://dx.doi.org/10.1109/dac.2018.8465784
https://re.public.polimi.it/handle/11311/1066452,
https://ieeexplore.ieee.org/abstract/document/8465784,
https://dl.acm.org/citation.cfm?id=3196112,
https://academic.microsoft.com/#/detail/2808967308


DOIS: 10.1145/3195970.3196112 10.1109/dac.2018.8465784

Back to Top

Document information

Published on 01/01/2018

Volume 2018, 2018
DOI: 10.1145/3195970.3196112
Licence: Other

Document Score

0

Views 0
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?