Many authors have shown how to break the AES cryptographic algorithm with side channel attacks, specially the timing attacks oriented to caches, like Prime+Probe. In this paper,
we present two practical timing attacks on NoC that improves Prime+Probe technique, the P+P Firecracker and P+P Arrow. Our attacks targets the communication between an ARM
Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC applied as a countermeasure of the timing attack. Finally, we demonstrate that attacks
on MPSoCs through the NoC are a real threat and need to be further explored.
«
Many authors have shown how to break the AES cryptographic algorithm with side channel attacks, specially the timing attacks oriented to caches, like Prime+Probe. In this paper,
we present two practical timing attacks on NoC that improves Prime+Probe technique, the P+P Firecracker and P+P Arrow. Our attacks targets the communication between an ARM
Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC applied as a countermeasure of the timing attack. Finally,...
»