{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:03:07Z","timestamp":1743037387424,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319546681"},{"type":"electronic","value":"9783319546698"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54669-8_14","type":"book-chapter","created":{"date-parts":[[2017,3,5]],"date-time":"2017-03-05T20:21:12Z","timestamp":1488745272000},"page":"228-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Zankl","sequence":"first","affiliation":[]},{"given":"Johann","family":"Heyszl","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,7]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O.: Yet another microarchitectural attack: exploiting i-cache. In: Proceedings of the 2007 ACM Workshop on Computer Security Architecture, CSAW 2007, pp. 11\u201318. ACM (2007)","DOI":"10.1145\/1314466.1314469"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-642-15031-9_8","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"O Ac\u0131i\u00e7mez","year":"2010","unstructured":"Ac\u0131i\u00e7mez, O., Brumley, B.B., Grabher, P.: New results on instruction cache attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 110\u2013124. Springer, Heidelberg (2010). doi:\n                    10.1007\/978-3-642-15031-9_8"},{"key":"14_CR3","unstructured":"ARM Limited: mbed TLS (2016). \n                    https:\/\/tls.mbed.org\/"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Barthe, G., Betarte, G., Campo, J., Luna, C., Pichardie, D.: System-level non-interference for constant-time cryptography. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 1267\u20131279. ACM, New York (2014)","DOI":"10.1145\/2660267.2660283"},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.jss.2012.07.020","volume":"86","author":"C Chen","year":"2013","unstructured":"Chen, C., Wang, T., Kou, Y., Chen, X., Li, X.: Improvement of trace-driven i-cache timing attack on the RSA algorithm. J. Syst. Softw. 86(1), 100\u2013107 (2013)","journal-title":"J. Syst. Softw."},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999). doi:\n                    10.1007\/3-540-48059-5_25"},{"key":"14_CR7","unstructured":"Doychev, G., Feld, D., K\u00f6pf, B., Mauborgne, L., Reineke, J.: Cacheaudit: a tool for the static analysis of cache side channels. In: Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13), pp. 431\u2013446. USENIX, Washington, D.C. (2013)"},{"key":"14_CR8","unstructured":"Doychev, G., K\u00f6pf, B.: Rigorous analysis of software countermeasures against cache attacks (2016). \n                    https:\/\/arxiv.org\/abs\/1603.02187v2"},{"key":"14_CR9","unstructured":"Google Inc.: boringssl (2016). \n                    https:\/\/boringssl.googlesource.com\/boringssl\/"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"DM Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. J. Algorithms 27(1), 129\u2013146 (1998)","journal-title":"J. Algorithms"},{"key":"14_CR11","unstructured":"Gutmann, P.: cryptlib (2016). \n                    https:\/\/www.cs.auckland.ac.nz\/~pgut001\/cryptlib\/"},{"key":"14_CR12","unstructured":"INSIDE Secure Corporation: MatrixSSL (2016). \n                    http:\/\/www.matrixssl.org"},{"key":"14_CR13","unstructured":"Intel Corporation: Pin - A Dynamic Binary Instrumentation Tool, June 2012. \n                    https:\/\/software.intel.com\/en-us\/articles\/pintool"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2002","author":"M Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291\u2013302. Springer, Heidelberg (2003). doi:\n                    10.1007\/3-540-36400-5_22"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/0898-1221(95)00153-P","volume":"30","author":"\u00c7K Ko\u00e7","year":"1995","unstructured":"Ko\u00e7, \u00c7.K.: Analysis of sliding window techniques for exponentiation. Comput. Math. Appl. 30, 17\u201324 (1995)","journal-title":"Comput. Math. Appl."},{"key":"14_CR16","series-title":"Addison-Wesley Series in Computer Science and Information Processing","volume-title":"The Art of Computer Programming: Seminumerical Algorithms","author":"D Knuth","year":"1981","unstructured":"Knuth, D.: The Art of Computer Programming: Seminumerical Algorithms. Addison-Wesley Series in Computer Science and Information Processing. Addison-Wesley, Reading (1981)"},{"key":"14_CR17","unstructured":"Koch, W.: Libgcrypt (2016). \n                    https:\/\/www.gnu.org\/software\/libgcrypt\/"},{"key":"14_CR18","unstructured":"Langley, A.: ctgrind - checking that functions are constant time with valgrind (2010). \n                    https:\/\/github.com\/agl\/ctgrind"},{"key":"14_CR19","unstructured":"M\u00f6ller, N.: Nettle - a low-level cryptographic library (2016). \n                    https:\/\/www.lysator.liu.se\/~nisse\/nettle\/"},{"key":"14_CR20","unstructured":"Molnar, D., Piotrowski, M., Schultz, D., Wagner, D.: The program counter security model: automatic detection and removal of control-flow side channel attacks. Cryptology ePrint Archive, Report 2005\/368 (2005). \n                    http:\/\/eprint.iacr.org\/2005\/368"},{"key":"14_CR21","unstructured":"OpenBSD: LibreSSL (2016). \n                    http:\/\/www.libressl.org\/"},{"key":"14_CR22","unstructured":"Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan 2005 (2005)"},{"key":"14_CR23","unstructured":"Reparaz, O., Balasch, J., Verbauwhede, I.: Dude, is my code constant time? Cryptology ePrint Archive, Report 2016\/1123 (2016). \n                    http:\/\/eprint.iacr.org\/2016\/1123"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Rodrigues, B., Quint\u00e3o Pereira, F.M., Aranha, D.F.: Sparse representation of implicit flows with applications to side-channel detection. In: Proceedings of the 25th International Conference on Compiler Construction, CC 2016, pp. 110\u2013120. ACM, New York (2016)","DOI":"10.1145\/2892208.2892230"},{"key":"14_CR25","volume-title":"Applied Cryptography (2nd Ed.): Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography (2nd Ed.): Protocols, Algorithms, and Source Code in C. Wiley, New York (1995)"},{"key":"14_CR26","unstructured":"The GNU project: The GNU Multiple Precision Arithmetic Library (2016). \n                    https:\/\/gmplib.org\/"},{"key":"14_CR27","unstructured":"The OpenSSL Project: Changes between 0.9.7g and 0.9.7h, 11 October 2005. \n                    https:\/\/www.openssl.org\/news\/changelog.html"},{"key":"14_CR28","unstructured":"The OpenSSL Project: OpenSSL (2016). \n                    https:\/\/www.openssl.org\/"},{"key":"14_CR29","unstructured":"wolfSSL: wolfSSL User Manual, March 2016. \n                    https:\/\/www.wolfssl.com\/documentation\/wolfSSL-Manual.pdf\n                    \n                  , v3.9.0"},{"key":"14_CR30","unstructured":"wolfSSL Inc.: wolfSSL Embedded SSL Library (2016). \n                    https:\/\/www.wolfssl.com"},{"key":"14_CR31","unstructured":"Yarom, Y., Falkner, K.: Flush+reload: a high resolution, low noise, l3 cache side-channel attack. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20\u201322 August 2014, pp. 719\u2013732 (2013)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54669-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:51:20Z","timestamp":1558317080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54669-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319546681","9783319546698"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54669-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cannes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2016.cardis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}