Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a technical conference presentation from USENIX Security '24 exploring how data memory-dependent prefetchers (DMPs) can compromise cryptographic implementations. Discover groundbreaking research demonstrating end-to-end attacks on security-critical software using Apple m-series DMP, revealing vulnerabilities in constant-time cryptographic systems. Learn how researchers from multiple institutions uncovered that DMPs can activate on any victim program and potentially leak cached pointer-like data, leading to successful attacks on both classical cryptography implementations like OpenSSL Diffie-Hellman Key Exchange and Go RSA decryption, as well as post-quantum systems including CRYSTALS-Kyber and CRYSTALS-Dilithium. Gain insights into how this research challenges fundamental assumptions about microarchitectural side-channel attack defenses and the security implications for modern processor design.

Syllabus

USENIX Security '24 - GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data...

Taught by

USENIX

Reviews

Start your review of GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.