Quantitative Mitigation of Timing Side Channels

被引:13
作者
Tizpaz-Niari, Saeid [1 ]
Cerny, Pavol [1 ]
Trivedi, Ashutosh [1 ]
机构
[1] Univ Colorado Boulder, Boulder, CO 80309 USA
来源
COMPUTER AIDED VERIFICATION, CAV 2019, PT I | 2019年 / 11561卷
关键词
MODEL;
D O I
10.1007/978-3-030-25540-4_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Timing side channels pose a significant threat to the security and privacy of software applications. We propose an approach for mitigating this problem by decreasing the strength of the side channels as measured by entropy-based objectives, such as min-guess entropy. Our goal is to minimize the information leaks while guaranteeing a user-specified maximal acceptable performance overhead. We dub the decision version of this problem Shannon mitigation, and consider two variants, deterministic and stochastic. First, we show that the deterministic variant is NP-hard. However, we give a polynomial algorithm that finds an optimal solution from a restricted set. Second, for the stochastic variant, we develop an approach that uses optimization techniques specific to the entropy-based objective used. For instance, for min-guess entropy, we used mixed integer-linear programming. We apply the algorithm to a threat model where the attacker gets to make functional observations, that is, where she observes the running time of the program for the same secret value combined with different public input values. Existing mitigation approaches do not give confidentiality or performance guarantees for this threat model. We evaluate our tool SCHMIT on a number of micro-benchmarks and real-world applications with different entropy-based objectives. In contrast to the existing mitigation approaches, we show that in the functional-observation threat model, SCHMIT is scalable and able to maximize confidentiality under the performance overhead bound.
引用
收藏
页码:140 / 160
页数:21
相关论文
共 43 条
  • [1] Agat J., 2000, Conference Record of POPL'00: 27th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages. Papers Presented at the Symposium, P40, DOI 10.1145/325694.325702
  • [2] NP-hardness of Euclidean sum-of-squares clustering
    Aloise, Daniel
    Deshpande, Amit
    Hansen, Pierre
    Popat, Preyas
    [J]. MACHINE LEARNING, 2009, 75 (02) : 245 - 248
  • [3] Antonopoulos T, 2017, ACM SIGPLAN NOTICES, V52, P362, DOI [10.1145/3062341.3062378, 10.1145/3140587.3062378]
  • [4] Predictive Black-Box Mitigation of Timing Channels
    Askarov, Aslan
    Zhang, Danfeng
    Myers, Andrew C.
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 297 - 307
  • [5] Automatic Discovery and Quantification of Information Leaks
    Backes, Michael
    Koepf, Boris
    Rybalchenko, Andrey
    [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 141 - +
  • [6] Bertsekas D.P, 2016, TECH REP
  • [7] Remote timing attacks are practical
    Brumley, D
    Boneh, D
    [J]. COMPUTER NETWORKS, 2005, 48 (05) : 701 - 716
  • [8] Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic
    Chen, Jia
    Feng, Yu
    Dillig, Isil
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 875 - 890
  • [9] Chiba S., 1998, P OOPSLA 1998 WORKSH, V174
  • [10] Dhem JF, 2000, LECT NOTES COMPUT SC, V1820, P167