Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Philipp Grabher is active.

Publication


Featured researches published by Philipp Grabher.


cryptographic hardware and embedded systems | 2010

New results on instruction cache attacks

Onur Aciicmez; Billy Bob Brumley; Philipp Grabher

We improve instruction cache data analysis techniques with a framework based on vector quantization and hidden Markov models. As a result, we are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, we run an I-cache attack on OpenSSLs DSA implementation and recover keys using lattice methods. Previous I-cache attacks were proof-of-concept: we present results of an actual attack in a real-world setting, proving these attacks to be realistic. We also present general software countermeasures, along with their performance impact, that are not algorithm specific and can be employed at the kernel and/or compiler level.


selected areas in cryptography | 2009

On Software Parallel Implementation of Cryptographic Pairings

Philipp Grabher; Johann Großschädl; Dan Page

A significant amount of research has focused on methods to improve the efficiency of cryptographic pairings; in part this work is motivated by the wide range of applications for such primitives. Although numerous hardware accelerators for pairing evaluation have used parallelism within extension field arithmetic to improve efficiency, thus far less emphasis has been placed on software exploitation of similar. In this paper we focus on parallelism within one pairing evaluation (intra-pairing), and parallelism between different pairing evaluations (inter-pairing). We identify several methods for exploiting such parallelism (extending previous results in the context of ECC) and show that it is possible to accelerate pairing evaluation by a significant factor in comparison to a naive approach.


cryptographic hardware and embedded systems | 2008

Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography

Philipp Grabher; Johann Großschädl; Dan Page

Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n1-bit execution units operating in SIMD mode. Particularly when implementing symmetric ciphers, the bit-slicing approach has several advantages over more conventional alternatives: it often allows one to reduce memory footprint by eliminating large look-up tables, and it permits more predictable performance characteristics that can foil time based side-channel attacks. Both features are attractive for mobile and embedded processors, but the performance overhead that results from bit-sliced implementation often represents a significant disadvantage. In this paper we describe a set of light-weight Instruction Set Extensions (ISEs) that can improve said performance while retaining all advantages of bit-sliced implementation. Contrary to other crypto-ISE, our design is generic and allows for a high degree of algorithm agility: we demonstrate applicability to several well-known cryptographic primitives including four block ciphers (DES, Serpent, AES, and PRESENT), a hash function (SHA-1), as well as multiplication of ternary polynomials.


Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding | 2007

Cryptographic side-channels from low-power cache memory

Philipp Grabher; Johann Großschädl; Daniel Page

To deliver real world cryptographic applications, we are increasingly reliant on security guarantees from both the underlying mathematics and physical implementation. The micro-processors that execute such applications are often designed with a focus on performance, area or power consumption. This strategy neglects physical security, a fact that has recently been exploited by a new breed of micro-architectural side-channel attacks. We introduce a new attack within this class which targets the use of low power cache memories. Although such caches offer an attractive compromise between performance and power consumption within mobile computing devices, we show that they permit attack where a more considered design strategy would not.


international conference on information and communication security | 2009

Hardware/Software co-design of public-key cryptography for SSL protocol execution in embedded systems

Manuel Koschuch; Johann Großschädl; Dan Page; Philipp Grabher; Matthias Hudler; Michael Krüger

Modern mobile devices like cell phones or PDAs allow for a level of network connectivity similar to that of standard PCs, making access to the Internet possible from anywhere at anytime. Going along with this evolution is an increasing demand for cryptographically secure network connections with such resource-restricted devices. The Secure Sockets Layer (SSL) protocol is the current de-facto standard for secure communication over an insecure network like the Internet and provides protection against eavesdropping, message forgery and replay attacks. To achieve this, the SSL protocol employs a set of computation-intensive cryptographic algorithms, in particular public-key algorithms, which can result in unacceptably long delays on devices with modest processing capabilities. In this paper we introduce a hardware/software co-design approach for accelerating SSL protocol execution in resource-restricted devices. The software part of our co-design consists of MatrixSSLTM, a lightweight SSL implementation into which we integrated elliptic curve cryptography (ECC) to speed up the public-key operations performed during the SSL handshake. The hardware part comprises a SPARC V8 compliant processor core with instruction set extensions to support the low-level arithmetic operations carried out in ECC. Our co-design executes a full SSL handshake using an elliptic curve over a 192-bit prime field in less than 300 msec when the SPARC processor is clocked at 20 MHz. A pure software implementation like OpenSSL is, depending on the field type and order, up to a factor of 10 slower than our co-design solution.


field programmable logic and applications | 2012

On reconfigurable fabrics and generic side-channel countermeasures

Robert Beat; Philipp Grabher; Daniel Page; Stefan Tillich; Marcin Wójcik

The use of field programmable devices in security-critical applications is growing in popularity; in part, this can be attributed to their potential for balancing metrics such as efficiency and algorithm agility. However, in common with non-programmable alternatives, physical attack techniques such as fault and power analysis are a threat. We investigate a family of next-generation field programmable devices, specifically those based on the concept of time multiplexing, within this context: our results support the premise that extra, inherent flexibility in such devices can offer a range of possibilities for low-overhead, generic countermeasures against physical attack.


Journal of Cryptographic Engineering | 2012

An exploration of mechanisms for dynamic cryptographic instruction set extension

Philipp Grabher; Johann Großschädl; Simon Hoerder; Kimmo Järvinen; Daniel Page; Stefan Tillich; Marcin Wójcik

Instruction set extensions (ISEs) supplement a host processor with special-purpose, typically fixed-function hardware components and instructions to utilise them. For cryptographic use-cases, this can be very effective due to the demand for non-standard or niche operations that are not supported by general-purpose architectures. However, one disadvantage of fixed-function ISEs is inflexibility, contradicting a need for “algorithm agility”. This paper explores a new approach, namely the provision of reconfigurable mechanisms to support dynamic (run-time changeable) ISEs. Our results, obtained using an FPGA-based LEON3 prototype, show that this approach provides a flexible general-purpose platform for cryptographic ISEs with all known advantages of previous work, but relies on careful analysis of the associated security issues.


IACR Cryptology ePrint Archive | 2013

On the (re)design of an FPGA-based PUF.

Philipp Grabher; Dan Page; Marcin Wójcik


The Institute of Electrical and Electronics Engineers | 2012

Field Programmable Logic - FPL 2012

Robert Beat; Philipp Grabher; Daniel Page; Stefan Tillich; Marcin Wójcik


IACR Cryptology ePrint Archive | 2012

On Reconfigurable Fabrics and Generic Side-Channel Countermeasures.

Robert Beat; Philipp Grabher; Dan Page; Stefan Tillich; Marcin Wójcik

Collaboration


Dive into the Philipp Grabher's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dan Page

University of Bristol

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stefan Tillich

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manuel Koschuch

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Billy Bob Brumley

Tampere University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge