Improving FLUSH+RELOAD

Due to an increasing error probability, there exists an upper bound on the accuracy of FLUSH+RELOAD, a cache side-channel attack technique. 

The goals for this project were to improve the accuracy of the technique, making it more efficient in distinguishing between multiple events, while maintaining a feasible error probability. To achieve this, we used an iterative procedure to pinpoint the times of victim accesses, requiring multiple executions of the FLUSH+RELOAD attack on the encryption software GnuPG 1.4.13.

Theme
Securing our future

Booth
SF37

School
Computer Science

Exhibitor
Aaron Graham

vote for this project: sf37

Back to project list