Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time"

被引:58
作者
Barthe, Gilles [1 ]
Gregoire, Benjamin [2 ]
Laporte, Vincent [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] INRIA, Sophia Antipolis, France
来源
IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018) | 2018年
关键词
D O I
10.1109/CSF.2018.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-based countermeasures provide effective mitigation against side-channel attacks, often with minimal efficiency and deployment overheads. Their effectiveness is often amenable to rigorous analysis: specifically, several popular countermeasures can be formalized as information flow policies, and correct implementation of the countermeasures can be verified with state-of-the-art analysis and verification techniques. However, in absence of further justification, the guarantees only hold for the language (source, target, or intermediate representation) on which the analysis is performed. We consider the problem of preserving side-channel countermeasures by compilation for cryptographic "constant-time", a popular countermeasure against cache-based timing attacks. We present a general method, based on the notion of constant-time simulation, for proving that a compilation pass preserves the constant-time countermeasure. Using the Coq proof assistant, we verify the correctness of our method and of several representative instantiations.
引用
收藏
页码:328 / 343
页数:16
相关论文
共 31 条
[1]   Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS [J].
Albrecht, Martin R. ;
Paterson, Kenneth G. .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :622-643
[2]   Lucky Thirteen: Breaking the TLS and DTLS Record Protocols [J].
AlFardan, Nadhem J. ;
Paterson, Kenneth G. .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :526-540
[3]  
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[4]  
Almeida Jose Bacelar, 2017, P 24 ACM C COMP COMM
[5]  
Andrysco Marc, 2015, SECURITY PRIVACY
[6]  
[Anonymous], 2018, ARXIV E PRINTS
[7]  
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[8]  
Barthe G, 2007, LECT NOTES COMPUT SC, V4734, P2
[9]   Verified Translation Validation of Static Analyses [J].
Barthe, Gilles ;
Blazy, Sandrine ;
Laporte, Vincent ;
Pichardie, David ;
Trieu, Alix .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :405-419
[10]   System-level Non-interference for Constant-time Cryptography [J].
Barthe, Gilles ;
Betarte, Gustavo ;
Diego Campo, Juan ;
Luna, Carlos ;
Pichardie, David .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1267-1279