CVE-2020-12399: research data and tooling

Description

This dataset and software tools are for reproducing the research results related to CVE-2020-12399, resulting from the manuscript "Déjà vu: Side-channel analysis of Mozilla's NSS", to appear at ACM CCS 2020. - The data is from a remote timing attack against the NSS v3.51 implementation of DSA signing. - The client machine was a 3.1 GHz 64-bit Intel i5-2400 CPU (Sandy Bridge). - The server machine was a Raspberry Pi 3 Model B plus board containing a 1.4 GHz 64-bit quad-core Cortex-A53 processor. - The client and server were connected by a Cisco 9300 series enterprise switch over Gbit Ethernet. - The data contains pow(2,18) samples. - The data was used to produce Figure 1 in the paper and contains all the remote timing attack data from Section 4.
Show more

Year of publication

2020

Type of data

Authors

Alejandro Cabrera Aldaya - Creator

Billy Brumley - Creator

Cesar Pereida Garcia - Creator

Iaroslav Gridin - Creator

Ignacio Delgado Lozano - Creator

Jesus Chi Dominguez - Creator

N Sohaib ul Hassan - Creator

Zenodo - Publisher

Project

Other information

Fields of science

Electronic, automation and communications engineering, electronics

Language

English

Open access

Open

License

Other

Keywords

Electronic automation and communications engineering electronics

Subject headings

Temporal coverage

undefined

Related to this research data