Remote timing attacks are practical

224Citations
Citations of this article
184Readers
Mendeley users who have this article in their library.

Abstract

Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running on a machine in the local network. Our results demonstrate that timing attacks against network servers are practical and therefore security systems should defend against them. © 2005 Elsevier B.V. All rights reserved.

Cite

CITATION STYLE

APA

Brumley, D., & Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716. https://doi.org/10.1016/j.comnet.2005.01.010

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free