POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives

被引:0
|
作者
Kim, Myung-Hyun [1 ]
Youn, Taek-Young [1 ]
Lee, Seungkwang [1 ]
机构
[1] Dankook Univ, Yongin, Gyeonggi Do, South Korea
关键词
White-box cryptography; Masking; Shuffling; Binary injection attack;
D O I
10.1007/978-3-031-41181-6_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
White-box cryptographic implementations with masking and shuffling have been proposed to protect against key extraction attacks. However, higher-order Differential Computation Analysis (HO-DCA) and its variants have been developed to break these countermeasures without having to perform reverse engineering. These non-invasive attacks are, however, costly to perform and can also be prevented by adapting novel constructions of masking and shuffling methods. This poster presents a simple binary injection attack on state-of-the-art masking and shuffling countermeasures. By injecting just a few lines of assembly code, the attacker can nullify run-time random sources, rendering randomness ineffective in hiding key-sensitive intermediate values. Our proposed attack mainly consists of hijacking the GOT entries and function calls to overcome run-time countermeasures protecting white-box cryptographic implementations.
引用
收藏
页码:675 / 679
页数:5
相关论文
共 50 条
  • [1] POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives
    Kim, Myung-Hyun
    Youn, Taek-Young
    Lee, Seungkwang
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 13907 LNCS : 675 - 679
  • [2] SOFTWARE RUN-TIME PROTECTION - A CRYPTOGRAPHIC ISSUE
    DOMINGOFERRER, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 474 - 480
  • [3] Run-time Attack Detection in Cryptographic APIs
    Focardi, Riccardo
    Squarcina, Marco
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 176 - 188
  • [4] Poster Abstract: Run-time Dynamic WCET Estimation
    Cagnizi, Lia
    Reghenzani, Federico
    Fornaciari, William
    [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 458 - 460
  • [5] POSTER: Leveraging Run-Time Feedback for Efficient ASR Acceleration
    Yazdani, Reza
    Arnau, Jose-Maria
    Gonzalez, Antonio
    [J]. 2019 28TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT 2019), 2019, : 462 - 463
  • [6] Bounding the expected run-time of nonconvex optimization with early stopping
    Flynn, Thomas
    Yu, Kwang Min
    Malik, Abid
    D'Imperio, Nicolas
    Yoo, Shinjae
    [J]. CONFERENCE ON UNCERTAINTY IN ARTIFICIAL INTELLIGENCE (UAI 2020), 2020, 124 : 51 - 60
  • [7] Optimal stopping for the run-time self-adaptation of software systems
    Skroch, Oliver
    Turowski, Klaus
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2010, 31 (01): : 147 - 157
  • [8] A Performance based Comparison of Various Symmetric Cryptographic Algorithms in Run-time Scenario
    Kumar, Praveen
    Rawat, Seema
    Choudhury, Tanupriya
    Pradhan, Saurabh
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 37 - 41
  • [9] Hardware Dithering: A Run-Time Method for Trojan Neutralization in Wireless Cryptographic ICs
    Kapatsori, Christiana
    Liu, Yu
    Antonopoulos, Angelos
    Makris, Yiorgos
    [J]. 2018 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2018,
  • [10] Run-time correction
    Grubb, WA
    [J]. OIL & GAS JOURNAL, 2004, 102 (13) : 10 - 10