Many authors have shown how to break the AES
cryptographic algorithm with side channel attacks, specially the timing attacks oriented to caches, like Prime+Probe. In this
paper, we present a practical timing attack on NoC that improves Prime+Probe technique. Our attack targets the communication between an ARM Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC applied as a countermeasure of the timing attack. Finally, we demonstrate that attacks on MPSoCs through the NoC are a real threat and need to be further explored.
«
Many authors have shown how to break the AES
cryptographic algorithm with side channel attacks, specially the timing attacks oriented to caches, like Prime+Probe. In this
paper, we present a practical timing attack on NoC that improves Prime+Probe technique. Our attack targets the communication between an ARM Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC applied as a countermeasure of the timing attack. Finally, we demonstrate that attacks on MPSoCs...
»