• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1Security
2   * An adversary with access to precise enough information about memory
3     accesses (typically, an untrusted operating system attacking a secure
4     enclave) could recover an RSA private key after observing the victim
5     performing a single private-key operation if the window size used for the
6     exponentiation was 3 or smaller. Found and reported by Zili KOU,
7     Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
8     and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
9     and Test in Europe 2023.
10
11