Drive-by Key-Extraction Cache Attacks from Portable Code
IACR Cryptology ePrint Archive, Volume 2018, 2018.
We show how malicious web content can extract cryptographic secret keys from the user’s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and thereby gleans information about the memory accesses of other programs running on the user’s computer. We show how thi...More
Full Text (Upload PDF)
PPT (Upload PPT)