Cache attack on AES for android smartphone

  • Bo Li
  • , Bo Jiang*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cache attack is mainly based on information leakage through the timing difference between cache hit and miss. It is an effective technique to attack AES implementations on x86 platform. However, since the cache architecture, instruction set of smartphone is different from that of the Intel x86 platform, effective cache attack on AES implementations for smart phones still faces several challenges. In this work, we realized an effective cache attack on AES implementations for Android smart phone based on the Prime+Probe strategy. We also proposed to use K-S statistical test to help rank private key assumptions in noisy execution environment. Our results show that cache attack on ASE implementations for Android platform is practical and countermeasures are needed to ensure mobile security.

Original languageEnglish
Title of host publicationProceedings of 2018 the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018
PublisherAssociation for Computing Machinery
Pages138-143
Number of pages6
ISBN (Electronic)9781450363617
DOIs
StatePublished - 16 Mar 2018
Event2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018 - Guiyang, China
Duration: 16 Mar 201818 Mar 2018

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018
Country/TerritoryChina
CityGuiyang
Period16/03/1818/03/18

Keywords

  • AES
  • Android
  • Cache attack
  • Side channel attack

Fingerprint

Dive into the research topics of 'Cache attack on AES for android smartphone'. Together they form a unique fingerprint.

Cite this