CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations

被引:0
|
作者
Deng, Sen [1 ]
Li, Mengyuan [2 ]
Tang, Yining [1 ]
Wang, Shuai [3 ]
Yan, Shoumeng [4 ]
Zhang, Yinqian [1 ]
机构
[1] Southern Univ Sci & Technol, Shenzhen, Guangdong, Peoples R China
[2] Ohio State Univ, Columbus, OH USA
[3] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[4] Ant Grp, Hangzhou, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ciphertext side channel is a new type of side channels that exploits deterministic memory encryption of trusted execution environments (TEE). It enables the adversary with read accesses to the ciphertext of the encrypted memory, either logically or physically, to compromise cryptographic implementations protected by TEEs with high fidelity. Prior studies have concluded that the ciphertext side channel is a severe threat to not onlyAMD SEV-SNP, where the vulnerability was first discovered, but to all TEEs with deterministic memory encryption. In this paper, we propose CIPHERH, a practical framework for automating the analysis of cryptographic software and detecting program points vulnerable to ciphertext side channels. CIPHERH is designed to perform a practical hybrid analysis in production cryptographic software, with a speedy dynamic taint analysis to track the usage of secrets throughout the entire program and a static symbolic execution procedure on each "tainted" function to reason about ciphertext side-channel vulnerabilities using symbolic constraint. Empirical evaluation has led to the discovery of over 200 vulnerable program points from the state-of-the-art RSA and ECDSA/ECDH implementations from OpenSSL, MbedTLS, andWolfSSL. Representative cases have been reported to and confirmed or patched by the developers.
引用
收藏
页码:6843 / 6860
页数:18
相关论文
共 50 条
  • [1] A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
    Geimer, Antoine
    Vergnolle, Matheo
    Recoules, Frederic
    Daniel, Lesly-Ann
    Bardin, Sebastien
    Maurice, Clementine
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1690 - 1704
  • [2] Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
    Erata, Ferhat
    Piskac, Ruzica
    Mateu, Victor
    Szefer, Jakub
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 687 - 706
  • [3] Automated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications
    Chapman, Peter
    Evans, David
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 263 - 274
  • [4] Automated design of cryptographic devices resistant to multiple side-channel attacks
    Kulikowski, Konrad
    Smirnov, Alexander
    Taubin, Alexander
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 399 - 413
  • [5] Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations
    Cobb, William E.
    Baldwin, Rusty O.
    Laspe, Eric D.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 16 (01)
  • [6] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [7] Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Dupressoir, Francois
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 163 - 184
  • [8] Hiding Higher-Order Side-Channel Leakage Randomizing Cryptographic Implementations in Reconfigurable Hardware
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 131 - 146
  • [9] Static Detection of Asymptotic Resource Side-Channel Vulnerabilities in Web Applications
    Chen, Jia
    Olivo, Oswaldo
    Dillig, Isil
    Lin, Calvin
    PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 229 - 239
  • [10] Irradiation Side-Channel Attack on Cryptographic Chip
    Qu, Ming
    Chang, Yuchun
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2016, : 41 - 45