Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/148096
Title: Implementation of cache attacks in practical scenarios and toolkit development
Authors: Loh, Benjamin Wen Qian
Keywords: Engineering::Computer science and engineering
Issue Date: 2021
Publisher: Nanyang Technological University
Source: Loh, B. W. Q. (2021). Implementation of cache attacks in practical scenarios and toolkit development. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148096
Project: SCSE20-0607
Abstract: The report describes the development of several software side-channel attacks which exploit cache vulnerabilities on Intel and ARM CPUs to break an AES (Advanced Encryption Standard) implementation. The cache vulnerabilities leak time-based information due to fetches from different areas of memory which can then be exploited to recover the full AES 128-bit keys. Theoretically, these side-channel attacks are easy to understand with existing literatures but are hard to implement in a practical scenario. In this project, the following side-channel attacks are developed: for Intel Central Processing Unit (CPU): (1) L1 Prime and Probe, (2) Last Level Core Prime and Probe, (3) Flush and Reload, (4) Evict and Reload and for ARM CPU: (5) Evict and Reload. These attacks are developed in C and illustrate a proof of concept of gathering the first nibble (i.e first 4 bits) of the AES key for each attack on an Ubuntu 18.04.3 LTS.
URI: https://hdl.handle.net/10356/148096
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
SCSEFYP_BENJAMIN_LOH_WEN_QIAN.pdf
  Restricted Access
1.1 MBAdobe PDFView/Open

Page view(s)

113
Updated on May 27, 2022

Download(s)

2
Updated on May 27, 2022

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.