Cache访问“命中”和“失效”会产生时间和能量消耗差异,这些差异信息已经成为加密系统的一种信息隐通道,密码界相继提出了计时Cache攻击、踪迹Cache攻击等Cache攻击方法.针对AES加密算法,提出一种新的Cache攻击-访问驱动Cache攻击,攻击从更细的粒度对Cache行为特征进行观察,利用间谍进程采集AES进程加密中所访问Cache行信息。通过直接分析和排除分析两种方法对采集信息进行分析,在大约20次加密样本条件下就可成功推断出128位完整密钥信息.
"Cache hit" and "Cache miss" behavior will generate timing and power consumption differences , this could be used as a covert information leakage channel for cryptographic systems while visiting the Cache, several Cache attack methods such as Timing-Driven Cache Attack,Trace-Driven Cache Attack were proposed by many cryptographists. A new kind of cache attack, Access-Driven Cache Attack, was described in this paper against AES, this attack scrutinize the Cache behavior with a finer granularity, a spy process was used to gather the accessed Cache line set of the AES encryption process, with the application of non-elimination and elimination methods to analyze these measured information, approximately 20 encryption samples are required to recovered full 128 bits AES key with a high probability of success.