{"id":"https://openalex.org/W2807459027","doi":"https://doi.org/10.1145/3196494.3196524","title":"Single Trace Attack Against RSA Key Generation in Intel SGX SSL","display_name":"Single Trace Attack Against RSA Key Generation in Intel SGX SSL","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2807459027","doi":"https://doi.org/10.1145/3196494.3196524","mag":"2807459027"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196524","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030189287","display_name":"Samuel Weiser","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Samuel Weiser","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091543506","display_name":"Raphael Spreitzer","orcid":"https://orcid.org/0000-0001-6844-292X"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Raphael Spreitzer","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065092593","display_name":"Lukas Bodner","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Lukas Bodner","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030189287"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":3.2152,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.93520441,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"575","last_page":"586"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8079949021339417},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5848883986473083},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5848791003227234},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5604988932609558},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5180273652076721},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.482601523399353},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4678773581981659},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4527294337749481},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.45182085037231445},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21715229749679565}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8079949021339417},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5848883986473083},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5848791003227234},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5604988932609558},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5180273652076721},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.482601523399353},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4678773581981659},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4527294337749481},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.45182085037231445},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21715229749679565},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196524","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5452871982","display_name":null,"funder_award_id":"681402","funder_id":"https://openalex.org/F4320338335","funder_display_name":"H2020 European Research Council"}],"funders":[{"id":"https://openalex.org/F4320310430","display_name":"TU Graz, Internationale Beziehungen und Mobilit\u00e4tsprogramme","ror":"https://ror.org/00d7xrm67"},{"id":"https://openalex.org/F4320338335","display_name":"H2020 European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W60869279","https://openalex.org/W298050208","https://openalex.org/W1427174644","https://openalex.org/W1490070390","https://openalex.org/W1499791368","https://openalex.org/W1558077212","https://openalex.org/W1585369853","https://openalex.org/W1613874182","https://openalex.org/W1660562555","https://openalex.org/W1832887889","https://openalex.org/W1941558319","https://openalex.org/W1996360405","https://openalex.org/W2004975280","https://openalex.org/W2007774531","https://openalex.org/W2017822141","https://openalex.org/W2036329595","https://openalex.org/W2056778557","https://openalex.org/W2093460657","https://openalex.org/W2103289002","https://openalex.org/W2123923527","https://openalex.org/W2128255161","https://openalex.org/W2146573211","https://openalex.org/W2150620897","https://openalex.org/W2350778671","https://openalex.org/W2402811135","https://openalex.org/W2498405448","https://openalex.org/W2550858797","https://openalex.org/W2562036180","https://openalex.org/W2599829375","https://openalex.org/W2606774910","https://openalex.org/W2612997195","https://openalex.org/W2613229705","https://openalex.org/W2616901112","https://openalex.org/W2619725017","https://openalex.org/W2620979425","https://openalex.org/W2621530037","https://openalex.org/W2663651296","https://openalex.org/W2726246108","https://openalex.org/W2735733036","https://openalex.org/W2741866430","https://openalex.org/W2753324901","https://openalex.org/W2761368276","https://openalex.org/W2769061097","https://openalex.org/W2778215685","https://openalex.org/W2950775255","https://openalex.org/W2951343197","https://openalex.org/W2953150480","https://openalex.org/W3028668932","https://openalex.org/W3101072679","https://openalex.org/W3161081806","https://openalex.org/W4232836212","https://openalex.org/W6633485244"],"related_works":["https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W2329175123","https://openalex.org/W1968560271","https://openalex.org/W2081998479","https://openalex.org/W2924092255"],"abstract_inverted_index":{"Microarchitectural":[0],"side-channel":[1,10],"attacks":[2,44,114],"have":[3],"received":[4],"significant":[5],"attention":[6,34],"recently.":[7],"However,":[8,74],"while":[9],"analyses":[11],"on":[12,162,224],"secret":[13,147],"key":[14,28,62,131,178,218],"operations":[15,59],"such":[16,60,103,256],"as":[17,61,68,257],"decryption":[18],"and":[19,70,214],"signature":[20],"generation":[21,29,63,132],"are":[22,65,250],"well":[23],"established,":[24],"the":[25,40,92,129,139,163,173,176,195,200,210,216],"process":[26],"of":[27,72,94,134,151,175,192,194,199,230,238],"did":[30],"not":[31],"receive":[32],"particular":[33],"so":[35],"far.":[36],"Especially":[37],"due":[38],"to":[39,54,145,243],"fact":[41],"that":[42,143],"microarchitectural":[43],"usually":[45],"require":[46],"multiple":[47],"observations":[48,150],"(more":[49],"than":[50,221],"one":[51,193],"measurement":[52],"trace)":[53],"break":[55],"an":[56,106,182,204],"implementation,":[57],"one-time":[58],"routines":[64],"often":[66],"considered":[67],"uncritical":[69],"out":[71],"scope.":[73],"this":[75,121],"assumption":[76],"is":[77,88,169],"no":[78],"longer":[79],"valid":[80],"for":[81,171,235,252],"shielded":[82,253],"execution":[83,254],"architectures,":[84],"where":[85],"sensitive":[86],"code":[87],"executed":[89],"-":[90,98],"in":[91,128,219],"realm":[93],"a":[95,104,125,152,159,225],"potential":[96],"attacker":[97],"inside":[99],"hardware":[100],"enclaves.":[101],"In":[102,120,155,228],"setting,":[105],"untrusted":[107],"operating":[108],"system":[109],"can":[110],"conduct":[111],"noiseless":[112],"controlled-channel":[113,160],"by":[115],"exploiting":[116],"page":[117],"access":[118],"patterns.":[119],"work,":[122],"we":[123,157,186,208,233],"identify":[124],"critical":[126],"vulnerability":[127],"RSA":[130,177,206],"procedure":[133],"Intel":[135,258],"SGX":[136,183],"SSL":[137],"(and":[138],"underlying":[140],"OpenSSL":[141],"library)":[142],"allows":[144],"recover":[146,187,209],"keys":[148],"from":[149],"single":[153,244],"execution.":[154],"particular,":[156],"mount":[158],"attack":[161],"binary":[164],"Euclidean":[165],"algorithm":[166],"(BEA),":[167],"which":[168],"used":[170],"checking":[172],"validity":[174],"parameters":[179],"generated":[180],"within":[181],"enclave.":[184],"Thereby,":[185],"all":[188],"but":[189],"16":[190,212],"bits":[191,213],"two":[196],"prime":[197],"factors":[198],"public":[201],"modulus.":[202],"For":[203],"8192-bit":[205],"modulus,":[207],"remaining":[211],"thus":[215],"full":[217],"less":[220],"12":[222],"seconds":[223],"commodity":[226],"PC.":[227],"light":[229],"these":[231],"results,":[232],"urge":[234],"careful":[236],"re-evaluation":[237],"cryptographic":[239],"libraries":[240],"with":[241],"respect":[242],"trace":[245],"attacks,":[246],"especially":[247],"if":[248],"they":[249],"intended":[251],"environments":[255],"SGX.":[259]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
