{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:56:18Z","timestamp":1743108978407,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030109691"},{"type":"electronic","value":"9783030109707"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-10970-7_11","type":"book-chapter","created":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T10:12:15Z","timestamp":1547287935000},"page":"235-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis"],"prefix":"10.1007","author":[{"given":"Ben","family":"Lapid","sequence":"first","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,13]]},"reference":[{"key":"11_CR1","unstructured":"ARM. Building a secure System using TrustZone Technology. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf"},{"key":"11_CR2","unstructured":"ARM. ARM trustzone (2018). https:\/\/www.arm.com\/products\/security-on-arm\/trustzone"},{"key":"11_CR3","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2005). https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"11_CR4","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. In: AES submission document (1999). http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/rijndael\/Rijndael-ammended.pdf"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338D: recommendation for block cipher modes of operation: Galois\/counter mode GCM and GMAC. National Institute of Standards & Technology (2007)","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"11_CR6","unstructured":"freddierice. Trident - temporary root for the Galaxy S7 active. https:\/\/github.com\/freddierice\/trident"},{"key":"11_CR7","unstructured":"Google. Android keymaster HAL. https:\/\/source.android.com\/security\/keystore\/implementer-ref"},{"key":"11_CR8","unstructured":"Google. Android keystore. https:\/\/developer.android.com\/training\/articles\/keystore.html"},{"key":"11_CR9","unstructured":"Google. Android keystore - source code. http:\/\/androidxref.com\/6.0.0_r1\/xref\/system\/security\/keystore\/keystore.cpp"},{"key":"11_CR10","unstructured":"Google. Android vold cryptfs. http:\/\/androidxref.com\/6.0.0_r1\/xref\/system\/vold\/cryptfs.c"},{"key":"11_CR11","unstructured":"Green, M., Rodrigues-Lima, L., Zankl, A., Irazoqui, G., Heyszl, J., Eisenbarth, T.: AutoLock: why cache attacks on ARM are harder than you think. In: 26th USENIX Security Symposium, pp. 1075\u20131091 (2017)"},{"issue":"3","key":"11_CR12","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.parco.2011.09.001","volume":"38","author":"A Kl\u00f6ckner","year":"2012","unstructured":"Kl\u00f6ckner, A., Pinto, N., Lee, Y., Catanzaro, B., Ivanov, P., Fasih, A.: PyCUDA and PyOpenCL: a scripting-based approach to GPU run-time code generation. Parallel Comput. 38(3), 157\u2013174 (2012)","journal-title":"Parallel Comput."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Lapid, B., Wool, A.: Navigating the Samsung TrustZone with applications to cache-attacks on AES-256 in the Keymaster trustlet. In: Proceedings of 23rd European Symposium on Research in Computer Security (ESORICS), Barcelona, September 2018, to appear","DOI":"10.1007\/978-3-319-99073-6_9"},{"key":"11_CR14","unstructured":"Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., Mangard, S.: ARMageddon: cache attacks on mobile devices. In: USENIX Security Conference, pp. 549\u2013564 (2016). https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity16\/sec16_paper_lipp.pdf"},{"key":"11_CR15","unstructured":"nccgroup. Cachegrab. https:\/\/github.com\/nccgroup\/cachegrab"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-74462-7_11","volume-title":"Selected Areas in Cryptography","author":"M Neve","year":"2007","unstructured":"Neve, M., Seifert, J.-P.: Advances on access-driven cache attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 147\u2013162. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74462-7_11"},{"key":"11_CR17","unstructured":"Neve, M., Tiri, K.: On the complexity of side-channel attacks on AES-256 - methodology and quantitative results on cache attacks. Technical report (2007). https:\/\/eprint.iacr.org\/2007\/318"},{"key":"11_CR18","unstructured":"OpenSSL. ARM AES implementation using cryptographic extensions. https:\/\/github.com\/openssl\/openssl\/blob\/master\/crypto\/aes\/asm\/aesv8-armx.pl"},{"key":"11_CR19","unstructured":"OpenSSL. ARMv7 AES bit sliced implementation. https:\/\/github.com\/openssl\/openssl\/blob\/master\/crypto\/aes\/asm\/bsaes-armv7.pl"},{"key":"11_CR20","unstructured":"OpenSSL. OpenSSL FIPS. https:\/\/www.openssl.org\/docs\/fips.html"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"11_CR22","unstructured":"Qualcomm. Snapdragon security (2018). https:\/\/www.qualcomm.com\/solutions\/mobile-computing\/features\/security"},{"key":"11_CR23","unstructured":"Samsung. Mobile processor: Exynos 7 Octa (7420) (2018). http:\/\/www.samsung.com\/semiconductor\/minisite\/exynos\/products\/mobileprocessor\/exynos-7-octa-7420\/"},{"key":"11_CR24","unstructured":"Samsung. Platform security (2018). http:\/\/developer.samsung.com\/tech-insights\/knox\/platform-security"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-40026-1_13","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"R Spreitzer","year":"2013","unstructured":"Spreitzer, R., Plos, T.: Cache-access pattern attack on disaligned AES T-tables. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 200\u2013214. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40026-1_13"},{"issue":"1","key":"11_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"E Tromer","year":"2010","unstructured":"Tromer, E., Osvik, D.A., Shamir, A.: Efficient cache attacks on AES, and countermeasures. J. Cryptol. 23(1), 37\u201371 (2010)","journal-title":"J. Cryptol."},{"key":"11_CR27","unstructured":"Trustonic. Trustonic Kinibi technology. https:\/\/developer.trustonic.com\/discover\/technology"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Xinjie, Z., Tao, W., Dong, M., Yuanyuan, Z., Zhaoyang, L.: Robust first two rounds access driven cache timing attack on AES. In: 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 785\u2013788. IEEE (2008)","DOI":"10.1109\/CSSE.2008.633"},{"key":"11_CR29","unstructured":"Zhang, N., Sun, K., Shands, D., Lou, W., Hou, Y.T.: TruSpy: cache side-channel information leakage from the secure world on ARM devices. IACR Cryptology ePrint Archive, 2016\/980 (2016)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10970-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T01:04:08Z","timestamp":1673485448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-10970-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030109691","9783030109707"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10970-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Calgary, AB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ucalgary.ca\/cpsc\/selected-areas-cryptography\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}