CVE-2020-12399: research data and tooling

Beskrivning

This dataset and software tools are for reproducing the research results related to CVE-2020-12399, resulting from the manuscript "Déjà vu: Side-channel analysis of Mozilla's NSS", to appear at ACM CCS 2020. - The data is from a remote timing attack against the NSS v3.51 implementation of DSA signing. - The client machine was a 3.1 GHz 64-bit Intel i5-2400 CPU (Sandy Bridge). - The server machine was a Raspberry Pi 3 Model B plus board containing a 1.4 GHz 64-bit quad-core Cortex-A53 processor. - The client and server were connected by a Cisco 9300 series enterprise switch over Gbit Ethernet. - The data contains pow(2,18) samples. - The data was used to produce Figure 1 in the paper and contains all the remote timing attack data from Section 4.
Visa mer

Publiceringsår

2020

Typ av data

Upphovspersoner

Alejandro Cabrera Aldaya - Upphovsperson

Billy Brumley - Upphovsperson

Cesar Pereida Garcia - Upphovsperson

Iaroslav Gridin - Upphovsperson

Ignacio Delgado Lozano - Upphovsperson

Jesus Chi Dominguez - Upphovsperson

N Sohaib ul Hassan - Upphovsperson

Zenodo - Utgivare

Projekt

Övriga uppgifter

Vetenskapsområden

El-, automations- och telekommunikationsteknik, elektronik

Språk

engelska

Öppen tillgång

Öppet

Licens

Other

Nyckelord

Electronic automation and communications engineering electronics

Ämnesord

Temporal täckning

undefined

Relaterade till denna forskningsdata