TY - JOUR
T1 - Physical key extraction attacks on PCs
AU - Genkin, Daniel
AU - Pachmanov, Lev
AU - Pipman, Itamar
AU - Shamir, Adi
AU - Tromer, Eran
PY - 2016/6
Y1 - 2016/6
N2 - CRYPTOGRAPHY IS UBIQUITOUS. Secure websites and financial, personal communication, corporate, and national secrets all depend on cryptographic algorithms operating correctly. Builders of cryptographic systems have learned (often the hard way) to devise algorithms and protocols with sound theoretical analysis, write software that implements them correctly, and robustly integrate them with the surrounding applications. Consequentially, direct attacks against state-of-the-art cryptographic software are getting increasingly difficult. For attackers, ramming the gates of cryptography is not the only option. They can instead undermine the fortification by violating basic assumptions made by the cryptographic software. One such assumption is software can control its outputs. Our programming courses explain that programs produce their outputs through designated interfaces (whether print, write, send, or mmap); so, to keep a secret, the software just Copyright held by authors.
AB - CRYPTOGRAPHY IS UBIQUITOUS. Secure websites and financial, personal communication, corporate, and national secrets all depend on cryptographic algorithms operating correctly. Builders of cryptographic systems have learned (often the hard way) to devise algorithms and protocols with sound theoretical analysis, write software that implements them correctly, and robustly integrate them with the surrounding applications. Consequentially, direct attacks against state-of-the-art cryptographic software are getting increasingly difficult. For attackers, ramming the gates of cryptography is not the only option. They can instead undermine the fortification by violating basic assumptions made by the cryptographic software. One such assumption is software can control its outputs. Our programming courses explain that programs produce their outputs through designated interfaces (whether print, write, send, or mmap); so, to keep a secret, the software just Copyright held by authors.
UR - http://www.scopus.com/inward/record.url?scp=84973466820&partnerID=8YFLogxK
U2 - 10.1145/2851486
DO - 10.1145/2851486
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84973466820
SN - 0001-0782
VL - 59
SP - 70
EP - 79
JO - Communications of the ACM
JF - Communications of the ACM
IS - 6
ER -