Remote timing attacks are practical

  • Authors:
  • David Brumley;Dan Boneh

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA;Computer Science Department, Stanford University, Stanford, CA

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running on a machine in the local network. Our results demonstrate that timing attacks against network servers are practical and therefore security systems should defend against them.