Entry Crosby:2009:OLR from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Crosby:2009:OLR,
  author =       "Scott A. Crosby and Dan S. Wallach and Rudolf H.
                 Riedi",
  title =        "Opportunities and Limits of Remote Timing Attacks",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "3",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2009",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1455526.1455530",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Feb 2 18:03:37 MST 2009",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Many algorithms can take a variable amount of time to
                 complete depending on the data being processed. These
                 timing differences can sometimes disclose confidential
                 information. Indeed, researchers have been able to
                 reconstruct an RSA private key purely by querying an
                 SSL Web server and timing the results. Our work
                 analyzes the limits of attacks based on accurately
                 measuring network response times and jitter over a
                 local network and across the Internet. We present the
                 design of filters to significantly reduce the effects
                 of jitter, allowing an attacker to measure events with
                 15--100$\mu$s accuracy across the Internet, and as good
                 as 100ns over a local network. Notably,
                 security-related algorithms on Web servers and other
                 network servers need to be carefully engineered to
                 avoid timing channel leaks at the accuracy demonstrated
                 in this article.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "Information leakage; jitter; timing attacks",
}

Related entries