Amplifying Side Channels Through Performance Degradation

被引:55
作者
Allan, Thomas [1 ,2 ]
Brumley, Billy Bob [3 ]
Falkner, Katrina [1 ]
van de Pol, Joop [4 ]
Yarom, Yuval [1 ,2 ]
机构
[1] Univ Adelaide, Adelaide, SA, Australia
[2] CSIRO, Data61, Adelaide, SA, Australia
[3] Tampere Univ Technol, Tampere, Finland
[4] Univ Bristol, Bristol, Avon, England
来源
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016) | 2016年
基金
英国工程与自然科学研究理事会;
关键词
DIGITAL SIGNATURE ALGORITHM; INSECURITY; ATTACKS; SERVICE;
D O I
10.1145/2991079.2991084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Interference between processes executing on shared hardware can be used to mount performance-degradation attacks. However, in most cases, such attacks offer little benefit for the adversary. In this paper, we demonstrate that software-based performance degradation attacks can be used to amplify side-channel leaks, enabling the adversary to increase both the amount and the quality of information captured. We identify a new information leak in the OpenSSL implementation of the ECDSA digital signature algorithm, albeit seemingly unexploitable due to the limited granularity of previous trace procurement techniques. To overcome this imposing hurdle, we combine the information leak with a microarchitectural performance degradation attack that can slow victims down by a factor of over 150. We demonstrate how this combination enables the amplification of a side-channel sufficiently to exploit this new information leak. Using the combined attack, an adversary can break a private key of the secp256ki curve, used in the Bitcoin protocol, after observing only 6 signatures-a four-fold improvement over all previously described attacks.
引用
收藏
页码:422 / 435
页数:14
相关论文
共 59 条
  • [1] ACIICMEZ O., 2010, CHES
  • [2] [Anonymous], 2004, SAC
  • [3] [Anonymous], 2001, INT WORKSH SEL AR CR, DOI [DOI 10.1007/3-540-45537-X13, DOI 10.1007/3-540-45537-X_13]
  • [4] [Anonymous], 2012, INT 64 IA 32 ARCH OP
  • [5] [Anonymous], 2009, P LINUX S, P19
  • [6] [Anonymous], 2013, DIGITAL SIGNATURE ST
  • [7] Apecechea G., 2015, ASIACCS 15 10 ACM S, P85, DOI [10.1145/2714576.2714625, DOI 10.1145/2714576.2714625]
  • [8] “Ooh Aah… Just a little bit”: A small amount of side channel can go a longway
    Benger, Naomi
    van de Pol, Joop
    Smart, Nigel P.
    Yarom, Yuval
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 75 - 92
  • [9] Faster Software for Fast Endomorphisms
    Brumley, Billy Bob
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 127 - 140
  • [10] Brumley BB, 2009, LECT NOTES COMPUT SC, V5912, P667, DOI 10.1007/978-3-642-10366-7_39