Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/148096
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Loh, Benjamin Wen Qian | en_US |
dc.date.accessioned | 2021-04-23T13:09:36Z | - |
dc.date.available | 2021-04-23T13:09:36Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Loh, B. W. Q. (2021). Implementation of cache attacks in practical scenarios and toolkit development. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148096 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/148096 | - |
dc.description.abstract | The report describes the development of several software side-channel attacks which exploit cache vulnerabilities on Intel and ARM CPUs to break an AES (Advanced Encryption Standard) implementation. The cache vulnerabilities leak time-based information due to fetches from different areas of memory which can then be exploited to recover the full AES 128-bit keys. Theoretically, these side-channel attacks are easy to understand with existing literatures but are hard to implement in a practical scenario. In this project, the following side-channel attacks are developed: for Intel Central Processing Unit (CPU): (1) L1 Prime and Probe, (2) Last Level Core Prime and Probe, (3) Flush and Reload, (4) Evict and Reload and for ARM CPU: (5) Evict and Reload. These attacks are developed in C and illustrate a proof of concept of gathering the first nibble (i.e first 4 bits) of the AES key for each attack on an Ubuntu 18.04.3 LTS. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Nanyang Technological University | en_US |
dc.relation | SCSE20-0607 | en_US |
dc.subject | Engineering::Computer science and engineering | en_US |
dc.title | Implementation of cache attacks in practical scenarios and toolkit development | en_US |
dc.type | Final Year Project (FYP) | en_US |
dc.contributor.supervisor | Li Fang | en_US |
dc.contributor.school | School of Computer Science and Engineering | en_US |
dc.description.degree | Bachelor of Engineering (Computer Science) | en_US |
dc.contributor.research | Temasek Laboratories @ NTU | en_US |
dc.contributor.supervisor2 | Romain Poussier | en_US |
dc.contributor.supervisor2 | Thomas Peyrin | en_US |
dc.contributor.supervisoremail | ASFLi@ntu.edu.sg | en_US |
item.grantfulltext | restricted | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SCSEFYP_BENJAMIN_LOH_WEN_QIAN.pdf Restricted Access | 1.1 MB | Adobe PDF | View/Open |
Page view(s)
303
Updated on Apr 24, 2025
Download(s)
6
Updated on Apr 24, 2025
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.