A Comparison Study on Flush+Reload and Prime+Probe Attacks on AES Using Machine Learning Approaches

Zirak Allaf,Mo Adda,Alexander Gegov
DOI: https://doi.org/10.1007/978-3-319-66939-7_17
2017-09-05
Abstract:AES, ElGamal are two examples of algorithms that have been developed in cryptography to protect data in a variety of domains including native and cloud systems, and mobile applications. There has been a good deal of research into the use of side channel attacks on these algorithms. This work has conducted an experiment to detect malicious loops inside Flush+Reload and Prime+Prob attack programs against AES through the exploitation of Hardware Performance Counters (HPC). This paper examines the accuracy and efficiency of three machine learning algorithms: Neural Network (NN); Decision Tree C4.5; and K Nearest Neighbours (KNN). The study also shows how Standard Performance Evaluation Corporation (SPEC) CPU2006 benchmarks impact predictions.
What problem does this paper attempt to address?