Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a groundbreaking conference presentation that introduces Achilles, a formal framework designed to systematically analyze and exploit vulnerabilities in cryptographic signature schemes through Rowhammer fault-injection attacks. Learn how this comprehensive framework addresses the limitations of existing ad-hoc attacks by providing a generalized approach to identifying and exploiting weaknesses across various signature schemes, rather than targeting individual parameters of specific implementations. Discover the formal procedure that induces Rowhammer faults into key parameters of a generalized signature scheme called G-sign, followed by post-Rowhammer analysis for secret recovery. Examine the practical evaluation of six different signature schemes, including both traditional and post-quantum signatures based on different mathematical problems, with five CVEs assigned to track their respective vulnerabilities. Understand how the research identifies two new vulnerable parameters for EdDSA and demonstrates successful Rowhammer attacks against all tested schemes using recent cryptographic libraries including wolfssl, relic, and liboqs. Gain insights into the broader implications of Rowhammer attacks on cybersecurity infrastructure and the systematic approach needed to assess the security of cryptographic implementations beyond their mathematical foundations.