Microarchitectural Data Sampling (MDS) enables to observe in-flight data that has recently been loaded or stored in shared short-time buffers on a physical CPU core. In-flight data sampled from line-fill buffers (LFBs) are also known as "ZombieLoads".
We present a new method that links the analysis of ZombieLoads to Differential Power Analysis (DPA) techniques and provides an alternative way to derive the secret key of block ciphers. This method compares observed ZombieLoads with predicted intermediate values that occur during cryptographic computations depending on a key hypothesis and known data. We validate this approach using an Advanced Encryption Standard (AES) software implementation.
Further, we provide a novel technique of cache line fingerprinting that reduces the superposition of ZombieLoads from different cache lines in the data sets resulting from an MDS attack. Thereby, this technique is helpful to reveal static secret data such as AES round keys which is shown in practice on an AES implementation.
History
Preferred Citation
Till Schlüter and Kerstin Lemke-Rust. Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers. In: Conference on Smart Card Research and Advanced Applications (CARDIS). 2020.
Primary Research Area
Secure Connected and Mobile Systems
Name of Conference
Conference on Smart Card Research and Advanced Applications (CARDIS)
Legacy Posted Date
2020-10-28
Open Access Type
Green
BibTeX
@inproceedings{cispa_all_3276,
title = "Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers",
author = "Schlüter, Till and Lemke-Rust, Kerstin",
booktitle="{Conference on Smart Card Research and Advanced Applications (CARDIS)}",
year="2020",
}