Fraunhofer AIS

Displaying 1-1 of 1 results

  • White Papers // Dec 2011

    A Cache Timing Attack on AES in Virtualization Environments

    The authors show in this paper that the isolation characteristic of system virtualization can be bypassed by the use of a cache timing at-tack. Using Bernstein's correlation in this attack, an adversary is able to extract sensitive keying material from an isolated trusted execution domain. They demonstrate this cache timing...

    Provided By Fraunhofer AIS

  • White Papers // Dec 2011

    A Cache Timing Attack on AES in Virtualization Environments

    The authors show in this paper that the isolation characteristic of system virtualization can be bypassed by the use of a cache timing at-tack. Using Bernstein's correlation in this attack, an adversary is able to extract sensitive keying material from an isolated trusted execution domain. They demonstrate this cache timing...

    Provided By Fraunhofer AIS