Drive-by Key-Extraction Cache Attacks from Portable Code

IACR Cryptology ePrint Archive, Volume 2018, 2018.

Cited by: 23|Bibtex|Views90
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com

Abstract:

We show how malicious web content can extract cryptographic secret keys from the user’s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and thereby gleans information about the memory accesses of other programs running on the user’s computer. We show how thi...More

Code:

Data:

Your rating :
0

 

Tags
Comments