Cryptographers Track at the RSA Conference, CT-RSA 2007, California, United States Of America, 5 - 09 February 2007, vol.4377 LNCS, pp.271-286, (Full Text)
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems if the server under attack runs on a multitasking or simultaneous multithreading system with a large enough workload. This is an important difference to recent cache-based timing attacks as these attacks either did not provide any supporting experimental results indicating if they can be applied remotely, or they are not realistically remote attacks.