Abstract | ||
---|---|---|
Cache-timing attacks are serious security threats that exploit cache memories to steal secret information. We believe that the identification of a sequence of function calls from cache-timing data measurements is not a trivial step when building an attack. We present a recurrent neural network model able to automatically retrieve a sequence of operations from cache timings. Inspired from natural language processing, our model is able to learn on partially labelled data. We use the model to unfold an end-to-end automated attack on OpenSSL ECDSA on the secp256k1 curve. Our attack is able to extract the 256 bits of the secret key by automatic analysis of about 2400 traces without any human processing. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1007/s13389-020-00228-5 | JOURNAL OF CRYPTOGRAPHIC ENGINEERING |
Keywords | DocType | Volume |
Side-channel analysis, Cache-timing attacks, Machine learning, Connectionist temporal classification (CTC), Recurrent neural network (RNN) | Journal | 11 |
Issue | ISSN | Citations |
2 | 2190-8508 | 1 |
PageRank | References | Authors |
0.36 | 0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Thomas Perianin | 1 | 1 | 0.36 |
Sebastien Carre | 2 | 2 | 1.72 |
Victor Dyseryn | 3 | 1 | 0.36 |
Adrien Facon | 4 | 1 | 0.36 |
Sylvain Guilley | 5 | 292 | 33.07 |