Abstract | ||
---|---|---|
We show how malicious web content can extract cryptographic secret keys from the user’s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and thereby gleans information about the memory accesses of other programs running on the user’s computer. We show how this side-channel attack can be realized in WebAssembly and PNaCl; how to attain fine-grained measurements; and how to extract ElGamal, ECDH and RSA decryption keys from various cryptographic libraries. |
Year | Venue | DocType |
---|---|---|
2018 | IACR Cryptology ePrint Archive | Conference |
Volume | Citations | PageRank |
2018 | 1 | 0.34 |
References | Authors | |
24 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Genkin | 1 | 579 | 31.18 |
Lev Pachmanov | 2 | 94 | 3.65 |
Eran Tromer | 3 | 2960 | 137.46 |
Yuval Yarom | 4 | 775 | 35.54 |