A Toolkit for Micro-architectural Attacks on Mobile Devices (available)

Micro-architectural attacks leverage side-effects from modern processor features during the execution of secret-dependent code. These attacks have emerged in recent years as a potent vector for recovering cryptographic keys and other secret data. Despite this, very few implementations of published attacks have been released publicly on mobile devices, which has raised questions about their reproduciblity. … full description “A Toolkit for Micro-architectural Attacks on Mobile Devices (available)”