{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T07:11:42Z","timestamp":1766301102175,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427295","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"291-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild"],"prefix":"10.1145","author":[{"given":"Daniel","family":"De Almeida Braga","sequence":"first","affiliation":[{"name":"Univ Rennes, CNRS, IRISA, France"}]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[{"name":"Univ Rennes, CNRS, IRISA, France"}]},{"given":"Mohamed","family":"Sabt","sequence":"additional","affiliation":[{"name":"Univ Rennes, CNRS, IRISA"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"11","article-title":"IEEE Standard for Information technology\u2014Telecommunications and information exchange between systems Local and metropolitan area networks\u2014Specific requirements - Part 11","volume":"802","year":"2016","unstructured":"2016 . IEEE Standard for Information technology\u2014Telecommunications and information exchange between systems Local and metropolitan area networks\u2014Specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802 . 11 - 2016 (Revision of IEEE Std 802.11-2012) (2016), 1\u20133534. 2016. IEEE Standard for Information technology\u2014Telecommunications and information exchange between systems Local and metropolitan area networks\u2014Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012) (2016), 1\u20133534.","journal-title":"IEEE Std"},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Two vulnerabilities in Radiator: EAP-pwd authentication bypass and DoS with certain TLS configurations. https:\/\/open.com.au\/OSC-SEC-2019-01.html Accessed: 2020-09-03.  2019. Two vulnerabilities in Radiator: EAP-pwd authentication bypass and DoS with certain TLS configurations. https:\/\/open.com.au\/OSC-SEC-2019-01.html Accessed: 2020-09-03."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.213-242"},{"key":"e_1_3_2_1_4_1","volume-title":"Joop van\u00a0de Pol, and Yuval Yarom","author":"Allan Thomas","year":"2016","unstructured":"Thomas Allan , Billy\u00a0Bob Brumley , Katrina\u00a0 E. Falkner , Joop van\u00a0de Pol, and Yuval Yarom . 2016 . Amplifying side channels through performance degradation. In ACSAC. ACM , 422\u2013435. Thomas Allan, Billy\u00a0Bob Brumley, Katrina\u00a0E. Falkner, Joop van\u00a0de Pol, and Yuval Yarom. 2016. Amplifying side channels through performance degradation. In ACSAC. ACM, 422\u2013435."},{"key":"e_1_3_2_1_5_1","unstructured":"Wi-Fi Alliance. 2019. WPA3 Security Considerations.  Wi-Fi Alliance. 2019. WPA3 Security Considerations."},{"key":"e_1_3_2_1_6_1","first-page":"615","article-title":"LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage","volume":"2020","author":"Aranha F.","year":"2020","unstructured":"Diego\u00a0 F. Aranha , Felipe\u00a0Rodrigues Novaes , Akira Takahashi , Mehdi Tibouchi , and Yuval Yarom . 2020 . LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage . IACR Cryptol. ePrint Arch. 2020 (2020), 615 . Diego\u00a0F. Aranha, Felipe\u00a0Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom. 2020. LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. IACR Cryptol. ePrint Arch. 2020 (2020), 615.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium. USENIX Association.","author":"Bellardo John","year":"2003","unstructured":"John Bellardo and Stefan Savage . 2003 . 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions . In USENIX Security Symposium. USENIX Association. John Bellardo and Stefan Savage. 2003. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_8_1","volume-title":"Nigel\u00a0P. Smart, and Yuval Yarom.","author":"Benger Naomi","year":"2014","unstructured":"Naomi Benger , Joop van\u00a0de Pol , Nigel\u00a0P. Smart, and Yuval Yarom. 2014 . \u201dOoh Aah... Just a Little Bit\u201d : A Small Amount of Side Channel Can Go a Long Way. In CHES(Lecture Notes in Computer Science), Vol.\u00a08731. Springer , 75\u201392. Naomi Benger, Joop van\u00a0de Pol, Nigel\u00a0P. Smart, and Yuval Yarom. 2014. \u201dOoh Aah... Just a Little Bit\u201d : A Small Amount of Side Channel Can Go a Long Way. In CHES(Lecture Notes in Computer Science), Vol.\u00a08731. Springer, 75\u201392."},{"volume-title":"CHES(Lecture Notes in Computer Science), Vol.\u00a09813","author":"Bruinderink Leon\u00a0Groot","key":"e_1_3_2_1_9_1","unstructured":"Leon\u00a0Groot Bruinderink , Andreas H\u00fclsing , Tanja Lange , and Yuval Yarom . 2016. Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. In CHES(Lecture Notes in Computer Science), Vol.\u00a09813 . Springer , 323\u2013345. Leon\u00a0Groot Bruinderink, Andreas H\u00fclsing, Tanja Lange, and Yuval Yarom. 2016. Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. In CHES(Lecture Notes in Computer Science), Vol.\u00a09813. Springer, 323\u2013345."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0081"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00046"},{"key":"e_1_3_2_1_12_1","unstructured":"Scott Fluhrer. 2014. Re: [CFRG] Requesting removal of CFRG co-chair. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/WXyM6pHDjGRZXZzSc_HlERnp0Iw\/  Scott Fluhrer. 2014. Re: [CFRG] Requesting removal of CFRG co-chair. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/WXyM6pHDjGRZXZzSc_HlERnp0Iw\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Scott Fluhrer. 2018. Re: [Cfrg] I-D for password-authenticated EAP method. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/mGnSNL8QW_fuCTwcyvh8lY9Z5G0\/  Scott Fluhrer. 2018. Re: [Cfrg] I-D for password-authenticated EAP method. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/mGnSNL8QW_fuCTwcyvh8lY9Z5G0\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134029"},{"key":"e_1_3_2_1_15_1","unstructured":"Dan Harkins. 2014. Addressing A Side-Channel Attack on SAE. https:\/\/mentor.ieee.org\/802.11\/dcn\/14\/11-14-0640-01-000m-side-channel-attack.docx  Dan Harkins. 2014. Addressing A Side-Channel Attack on SAE. https:\/\/mentor.ieee.org\/802.11\/dcn\/14\/11-14-0640-01-000m-side-channel-attack.docx"},{"key":"#cr-split#-e_1_3_2_1_16_1.1","doi-asserted-by":"crossref","unstructured":"Dan Harkins. 2015. Dragonfly Key Exchange. RFC 7664. https:\/\/doi.org\/10.17487\/RFC7664 10.17487\/RFC7664","DOI":"10.17487\/RFC7664"},{"key":"#cr-split#-e_1_3_2_1_16_1.2","doi-asserted-by":"crossref","unstructured":"Dan Harkins. 2015. Dragonfly Key Exchange. RFC 7664. https:\/\/doi.org\/10.17487\/RFC7664","DOI":"10.17487\/RFC7664"},{"key":"e_1_3_2_1_17_1","unstructured":"Dan Harkins. 2019. Finding PWE in Constant Time. https:\/\/mentor.ieee.org\/802.11\/dcn\/19\/11-19-1173-08-000m-pwe-in-constant-time.docx  Dan Harkins. 2019. Finding PWE in Constant Time. https:\/\/mentor.ieee.org\/802.11\/dcn\/19\/11-19-1173-08-000m-pwe-in-constant-time.docx"},{"key":"e_1_3_2_1_18_1","unstructured":"D. Harkins. 2019. Improved Extensible Authentication Protocol Using Only a Password draft-harkins-eap-pwd-prime-00. https:\/\/tools.ietf.org\/html\/draft-harkins-eap-pwd-prime-00  D. Harkins. 2019. Improved Extensible Authentication Protocol Using Only a Password draft-harkins-eap-pwd-prime-00. https:\/\/tools.ietf.org\/html\/draft-harkins-eap-pwd-prime-00"},{"key":"#cr-split#-e_1_3_2_1_19_1.1","doi-asserted-by":"crossref","unstructured":"Dan Harkins. 2019. Secure Password Ciphersuites for Transport Layer Security (TLS). RFC 8492. https:\/\/doi.org\/10.17487\/RFC8492 10.17487\/RFC8492","DOI":"10.17487\/RFC8492"},{"key":"#cr-split#-e_1_3_2_1_19_1.2","doi-asserted-by":"crossref","unstructured":"Dan Harkins. 2019. Secure Password Ciphersuites for Transport Layer Security (TLS). RFC 8492. https:\/\/doi.org\/10.17487\/RFC8492","DOI":"10.17487\/RFC8492"},{"volume-title":"CRYPTO(Lecture Notes in Computer Science), Vol.\u00a05677","author":"Icart Thomas","key":"e_1_3_2_1_20_1","unstructured":"Thomas Icart . 2009. How to Hash into Elliptic Curves . In CRYPTO(Lecture Notes in Computer Science), Vol.\u00a05677 . Springer , 303\u2013316. Thomas Icart. 2009. How to Hash into Elliptic Curves. In CRYPTO(Lecture Notes in Computer Science), Vol.\u00a05677. Springer, 303\u2013316."},{"key":"e_1_3_2_1_21_1","unstructured":"Kevin\u00a0M. Igoe. 2012. [Cfrg] Status of DragonFly. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/_BZEwEBBWhOPXn0Zw-cd3eSV6pY\/  Kevin\u00a0M. Igoe. 2012. [Cfrg] Status of DragonFly. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/_BZEwEBBWhOPXn0Zw-cd3eSV6pY\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Kevin\u00a0M. Igoe. 2012. Re: [Cfrg] Status of DragonFly. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/LsFX5Qqw53dTUmSsUOooLca5FHg\/  Kevin\u00a0M. Igoe. 2012. Re: [Cfrg] Status of DragonFly. https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/LsFX5Qqw53dTUmSsUOooLca5FHg\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Intel Corporation. 2016. Intel\u00ae 64 and IA-32 Architectures Optimization Reference Manual.  Intel Corporation. 2016. Intel\u00ae 64 and IA-32 Architectures Optimization Reference Manual."},{"key":"e_1_3_2_1_24_1","unstructured":"Dennis K\u00fcgler. 2010. Re: [IPsec] PAKE selection: SPSK. https:\/\/mailarchive.ietf.org\/arch\/msg\/ipsec\/NEicYFDYJYcQuNdknY0etLyfITA\/  Dennis K\u00fcgler. 2010. Re: [IPsec] PAKE selection: SPSK. https:\/\/mailarchive.ietf.org\/arch\/msg\/ipsec\/NEicYFDYJYcQuNdknY0etLyfITA\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Cubrilovic Nik. 2009. RockYou Hack: From Bad To Worse. https:\/\/techcrunch.com\/2009\/12\/14\/rockyou-hack-security-myspace-facebook-passwords\/  Cubrilovic Nik. 2009. RockYou Hack: From Bad To Worse. https:\/\/techcrunch.com\/2009\/12\/14\/rockyou-hack-security-myspace-facebook-passwords\/"},{"volume-title":"Model Based fuzzing of the WPA3 Dragonfly Handshake. Master\u2019s thesis","author":"Tschacher Nikolai","key":"e_1_3_2_1_26_1","unstructured":"Nikolai Tschacher . 2019. Model Based fuzzing of the WPA3 Dragonfly Handshake. Master\u2019s thesis . Institute for Computer Science, Humboldt University , Berlin, Germany . Nikolai Tschacher. 2019. Model Based fuzzing of the WPA3 Dragonfly Handshake. Master\u2019s thesis. Institute for Computer Science, Humboldt University, Berlin, Germany."},{"key":"e_1_3_2_1_27_1","unstructured":"NVlabs. 2016. XMP - CUDA accelerated(X) Multi-Precision library. https:\/\/github.com\/NVlabs\/xmp  NVlabs. 2016. XMP - CUDA accelerated(X) Multi-Precision library. https:\/\/github.com\/NVlabs\/xmp"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_29_1","unstructured":"Trevor Perrin. 2013. [TLS] Review of Dragonfly PAKE. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/A_SfHI4BsdAi4miklBs3TvUbu-Y\/  Trevor Perrin. 2013. [TLS] Review of Dragonfly PAKE. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/A_SfHI4BsdAi4miklBs3TvUbu-Y\/"},{"key":"e_1_3_2_1_30_1","volume-title":"Implementation of Post-Quantum Signatures. In ACM Conference on Computer and Communications Security. ACM","author":"Pessl Peter","year":"2017","unstructured":"Peter Pessl , Leon\u00a0Groot Bruinderink , and Yuval Yarom . 2017 . To BLISS-B or not to be: Attacking strongSwan\u2019s Implementation of Post-Quantum Signatures. In ACM Conference on Computer and Communications Security. ACM , 1843\u20131855. Peter Pessl, Leon\u00a0Groot Bruinderink, and Yuval Yarom. 2017. To BLISS-B or not to be: Attacking strongSwan\u2019s Implementation of Post-Quantum Signatures. In ACM Conference on Computer and Communications Security. ACM, 1843\u20131855."},{"key":"e_1_3_2_1_31_1","unstructured":"Defuse Security. [n.d.]. CrackStation\u2019s Password Cracking Dictionary (Human Passwords Only. https:\/\/crackstation.net\/crackstation-wordlist-password-cracking-dictionary.htm  Defuse Security. [n.d.]. CrackStation\u2019s Password Cracking Dictionary (Human Passwords Only. https:\/\/crackstation.net\/crackstation-wordlist-password-cracking-dictionary.htm"},{"key":"e_1_3_2_1_32_1","volume-title":"Smart, and Yuval Yarom","author":"van\u00a0de Pol Joop","year":"2015","unstructured":"Joop van\u00a0de Pol , Nigel\u00a0 P. Smart, and Yuval Yarom . 2015 . Just a Little Bit More. In CT-RSA(Lecture Notes in Computer Science), Vol.\u00a09048. Springer , 3\u201321. Joop van\u00a0de Pol, Nigel\u00a0P. Smart, and Yuval Yarom. 2015. Just a Little Bit More. In CT-RSA(Lecture Notes in Computer Science), Vol.\u00a09048. Springer, 3\u201321."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Mathy Vanhoef and Frank Piessens. 2014. Advanced Wi-Fi attacks using commodity hardware. In ACSAC. ACM 256\u2013265.  Mathy Vanhoef and Frank Piessens. 2014. Advanced Wi-Fi attacks using commodity hardware. In ACSAC. ACM 256\u2013265.","DOI":"10.1145\/2664243.2664260"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00031"},{"key":"e_1_3_2_1_36_1","volume-title":"Mastik: A Micro-Architectural Side-Channel Toolkit. https:\/\/cs.adelaide.edu.au\/~yval\/Mastik\/","author":"Yarom Yuval","year":"2016","unstructured":"Yuval Yarom . 2016 . Mastik: A Micro-Architectural Side-Channel Toolkit. https:\/\/cs.adelaide.edu.au\/~yval\/Mastik\/ Yuval Yarom. 2016. Mastik: A Micro-Architectural Side-Channel Toolkit. https:\/\/cs.adelaide.edu.au\/~yval\/Mastik\/"},{"key":"e_1_3_2_1_37_1","first-page":"140","article-title":"Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack","volume":"2014","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Naomi Benger . 2014 . Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack . IACR Cryptol. ePrint Arch. 2014 (2014), 140 . Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. IACR Cryptol. ePrint Arch. 2014 (2014), 140.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security Symposium. USENIX Association, 719\u2013732","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In USENIX Security Symposium. USENIX Association, 719\u2013732 . Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium. USENIX Association, 719\u2013732."},{"volume-title":"CHES(Lecture Notes in Computer Science), Vol.\u00a09813","author":"Yarom Yuval","key":"e_1_3_2_1_39_1","unstructured":"Yuval Yarom , Daniel Genkin , and Nadia Heninger . 2016. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA . In CHES(Lecture Notes in Computer Science), Vol.\u00a09813 . Springer , 346\u2013367. Yuval Yarom, Daniel Genkin, and Nadia Heninger. 2016. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. In CHES(Lecture Notes in Computer Science), Vol.\u00a09813. Springer, 346\u2013367."},{"key":"#cr-split#-e_1_3_2_1_40_1.1","doi-asserted-by":"crossref","unstructured":"Glen Zorn and Dan Harkins. 2010. Extensible Authentication Protocol (EAP) Authentication Using Only a Password. RFC 5931. https:\/\/doi.org\/10.17487\/RFC5931 10.17487\/RFC5931","DOI":"10.17487\/rfc5931"},{"key":"#cr-split#-e_1_3_2_1_40_1.2","doi-asserted-by":"crossref","unstructured":"Glen Zorn and Dan Harkins. 2010. Extensible Authentication Protocol (EAP) Authentication Using Only a Password. RFC 5931. https:\/\/doi.org\/10.17487\/RFC5931","DOI":"10.17487\/rfc5931"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":43,"alternative-id":["10.1145\/3427228.3427295","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427295","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}