CVE-2020-12399: research data and tooling
Beskrivning
This dataset and software tools are for reproducing the research results related to CVE-2020-12399, resulting from the manuscript "Déjà vu: Side-channel analysis of Mozilla's NSS", to appear at ACM CCS 2020.
- The data is from a remote timing attack against the NSS v3.51 implementation of DSA signing.
- The client machine was a 3.1 GHz 64-bit Intel i5-2400 CPU (Sandy Bridge).
- The server machine was a Raspberry Pi 3 Model B plus board containing a 1.4 GHz 64-bit quad-core Cortex-A53 processor.
- The client and server were connected by a Cisco 9300 series enterprise switch over Gbit Ethernet.
- The data contains pow(2,18) samples.
- The data was used to produce Figure 1 in the paper and contains all the remote timing attack data from Section 4.
Visa merPubliceringsår
2020
Typ av data
Upphovspersoner
Alejandro Cabrera Aldaya - Upphovsperson
Billy Brumley - Upphovsperson
Cesar Pereida Garcia - Upphovsperson
Iaroslav Gridin - Upphovsperson
Ignacio Delgado Lozano - Upphovsperson
Jesus Chi Dominguez - Upphovsperson
N Sohaib ul Hassan - Upphovsperson
Zenodo - Utgivare
Projekt
Övriga uppgifter
Vetenskapsområden
El-, automations- och telekommunikationsteknik, elektronik
Språk
engelska
Öppen tillgång
Öppet