It’s not clear how this is a realistic or possible exploit.
“We don't care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.”
Over how much time? What are the conditions that make this possible?
This reads like a hypothetical academic paper where the exploit wasn’t achieved.
“We don't care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.”
Over how much time? What are the conditions that make this possible?
This reads like a hypothetical academic paper where the exploit wasn’t achieved.