Bucketing and information flow analysis for provable timing attack mitigation

被引:0
|
作者
Terauchi, Tachio [1 ]
Antonopoulos, Timos [2 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
[2] Yale Univ, Dept Comp Sci, POB 2158, New Haven, CT 06520 USA
关键词
Side-channel attacks; timing attacks; bucketing; information flow; SIDE-CHANNEL COUNTERMEASURES; SAFETY; FOUNDATIONS;
D O I
10.3233/JCS-191356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the effect of bucketing in security against timing-channel attacks. Bucketing is a technique proposed to mitigate timing-channel attacks by restricting a system's outputs to only occur at designated time intervals, and has the effect of reducing the possible timing-channel observations to a small number of possibilities. However, there is little formal analysis on when and to what degree bucketing is effective against timing-channel attacks. In this paper, we show that bucketing is in general insufficient to ensure security. Then, we present two conditions that can be used to ensure security of systems against adaptive timing-channel attacks. The first is a general condition that ensures that the security of a system decreases only by a limited degree by allowing timing-channel observations, whereas the second condition ensures that the system would satisfy the first condition when bucketing is applied and hence becomes secure against timing-channel attacks. A main benefit of the conditions is that they allow separation of concerns whereby the security of the regular channel can be proven independently of concerns of side-channel information leakage, and certain conditions are placed on the side channel to guarantee the security of the whole system. Further, we show that the bucketing technique can be applied compositionally in conjunction with the constant-time-implementation technique to increase their applicability. While we instantiate our contributions to timing channel and bucketing, many of the results are actually quite general and are applicable to any side channels and techniques that reduce the number of possible observations on the channel. It is interesting to note that our results make non-trivial (and somewhat unconventional) uses of ideas from information flow research such as channel capacity and refinement order relation.
引用
下载
收藏
页码:607 / 634
页数:28
相关论文
共 50 条
  • [1] Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks
    Kobayashi, Yasuyuki
    Kaji, Yuichi
    Seki, Hiroyuki
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 561 - 565
  • [2] A Web Traffic Analysis Attack Using Only Timing Information
    Feghhi, Saman
    Leith, Douglas J.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1758 - 1770
  • [3] CINDAM: Customized Information Networks for Deception and Attack Mitigation
    Robertson, Seth
    Alexander, Scott
    Micallef, Josephine
    Pucci, Jonathan
    Tanis, James
    Macera, Anthony
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 114 - 119
  • [4] Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware Assumption
    Chakraborty, Prabuddha
    PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
  • [5] Analysis of Insiders Attack Mitigation Strategies
    Yusop, Zulkefli Mohd
    Abawajy, Jemal
    2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 581 - 591
  • [6] Analysis of Insiders Attack Mitigation Strategies
    Yusop, Zulkefli Mohd
    Abawajy, Jemal H.
    2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 611 - 618
  • [7] Timing-sensitive information flow analysis for synchronous systems
    Koepf, Boris
    Basin, David
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 243 - +
  • [8] Transforming flow information during code optimization for timing analysis
    Raimund Kirner
    Peter Puschner
    Adrian Prantl
    Real-Time Systems, 2010, 45 : 72 - 105
  • [9] Transforming flow information during code optimization for timing analysis
    Kirner, Raimund
    Puschner, Peter
    Prantl, Adrian
    REAL-TIME SYSTEMS, 2010, 45 (1-2) : 72 - 105
  • [10] Random flow network modeling and simulations for DDoS attack mitigation
    Kong, JJ
    Mirza, M
    Shu, J
    Yoedhana, C
    Gerla, M
    Lu, SW
    2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 487 - 491