Title
Drive-by Key-Extraction Cache Attacks from Portable Code.
Abstract
We show how malicious web content can extract cryptographic secret keys from the user’s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and thereby gleans information about the memory accesses of other programs running on the user’s computer. We show how this side-channel attack can be realized in WebAssembly and PNaCl; how to attain fine-grained measurements; and how to extract ElGamal, ECDH and RSA decryption keys from various cryptographic libraries.
Year
Venue
DocType
2018
IACR Cryptology ePrint Archive
Conference
Volume
Citations 
PageRank 
2018
1
0.34
References 
Authors
24
4
Name
Order
Citations
PageRank
Daniel Genkin157931.18
Lev Pachmanov2943.65
Eran Tromer32960137.46
Yuval Yarom477535.54