Skip to main content

Showing 1–4 of 4 results for author: Spreitzer, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1706.06381  [pdf, other

    cs.CR

    KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks

    Authors: Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard

    Abstract: Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Previously proposed countermeasures fail to prevent keystroke timing attacks as they do not protect keystroke processing among the entire software stack. We close… ▽ More

    Submitted 20 June, 2017; originally announced June 2017.

  2. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

    Authors: Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard

    Abstract: Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged) application is all it takes to exploit the leaking information on modern mobile devices. Giv… ▽ More

    Submitted 6 December, 2017; v1 submitted 11 November, 2016; originally announced November 2016.

  3. arXiv:1511.04897  [pdf, other

    cs.CR

    ARMageddon: Cache Attacks on Mobile Devices

    Authors: Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard

    Abstract: In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM CPUs that have a different cache organization and instruction set than Intel x86 CPUs. So far, no cross-core cache attacks have been demonstrated o… ▽ More

    Submitted 19 June, 2016; v1 submitted 16 November, 2015; originally announced November 2015.

    Comments: Original publication in the Proceedings of the 25th Annual USENIX Security Symposium (USENIX Security 2016). https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp

  4. arXiv:1405.3760  [pdf, other

    cs.CR

    PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices

    Authors: Raphael Spreitzer

    Abstract: In this paper, we propose a new type of side channel which is based on the ambient-light sensor employed in today's mobile devices. The pervasive usage of mobile devices, i.e., smartphones and tablet computers and their vast amount of sensors represent a plethora of side channels posing a serious threat to the user's privacy and security. While recent advances in this area of research focused on t… ▽ More

    Submitted 15 May, 2014; originally announced May 2014.