Bucketing and information flow analysis for provable timing attack mitigation

被引:0
|
作者
Terauchi, Tachio [1 ]
Antonopoulos, Timos [2 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
[2] Yale Univ, Dept Comp Sci, POB 2158, New Haven, CT 06520 USA
关键词
Side-channel attacks; timing attacks; bucketing; information flow; SIDE-CHANNEL COUNTERMEASURES; SAFETY; FOUNDATIONS;
D O I
10.3233/JCS-191356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the effect of bucketing in security against timing-channel attacks. Bucketing is a technique proposed to mitigate timing-channel attacks by restricting a system's outputs to only occur at designated time intervals, and has the effect of reducing the possible timing-channel observations to a small number of possibilities. However, there is little formal analysis on when and to what degree bucketing is effective against timing-channel attacks. In this paper, we show that bucketing is in general insufficient to ensure security. Then, we present two conditions that can be used to ensure security of systems against adaptive timing-channel attacks. The first is a general condition that ensures that the security of a system decreases only by a limited degree by allowing timing-channel observations, whereas the second condition ensures that the system would satisfy the first condition when bucketing is applied and hence becomes secure against timing-channel attacks. A main benefit of the conditions is that they allow separation of concerns whereby the security of the regular channel can be proven independently of concerns of side-channel information leakage, and certain conditions are placed on the side channel to guarantee the security of the whole system. Further, we show that the bucketing technique can be applied compositionally in conjunction with the constant-time-implementation technique to increase their applicability. While we instantiate our contributions to timing channel and bucketing, many of the results are actually quite general and are applicable to any side channels and techniques that reduce the number of possible observations on the channel. It is interesting to note that our results make non-trivial (and somewhat unconventional) uses of ideas from information flow research such as channel capacity and refinement order relation.
引用
下载
收藏
页码:607 / 634
页数:28
相关论文
共 50 条
  • [11] DDoS Attack Detection Method and Mitigation Using Pattern of the Flow
    Sanmorino, Ahmad
    Yazid, Setiadi
    2013 INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2013, : 12 - 16
  • [12] Timing Attack Analysis on AES on Modern Processors
    Kaushik, Prakhar
    Majumdar, Rana
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 462 - 465
  • [13] On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions
    Koh, Wen Wen
    Chuah, Chai Wen
    PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 146 - 151
  • [14] System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis
    Mirchev M.J.
    Mirtchev S.T.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 309 - 321
  • [15] Information System Hazard Analysis and Mitigation
    Mason-Blakley, Fieran
    2015 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2015), 2015, : 472 - 472
  • [16] Entropy and attack models in information flow (invited talk)
    Alvim M.S.
    Andrés M.E.
    Palamidessi C.
    IFIP Advances in Information and Communication Technology, 2010, 323 AICT : 53 - 54
  • [17] Quantitative Information Flow for Hardware: Advancing the Attack Landscape
    Reimann, Lennart M.
    Erdoenmez, Sarp
    Sisejkovic, Dominik
    Leupers, Rainer
    2023 IEEE 14TH LATIN AMERICA SYMPOSIUM ON CIRCUITS AND SYSTEMS, LASCAS, 2023, : 21 - 24
  • [18] Entropy and Attack Models in Information Flow (Invited Talk)
    Alvim, Mario S.
    Andres, Miguel E.
    Palamidessi, Catuscia
    THEORETICAL COMPUTER SCIENCE, 2010, 323 : 53 - +
  • [19] On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
    Wong, Ann Yi
    Chekole, Eyasu Getahun
    Ochoa, Martin
    Zhou, Jianying
    COMPUTERS & SECURITY, 2023, 128
  • [20] Integrated Situational Awareness for Cyber Attack Detection, Analysis, and Mitigation
    Cheng, Yi
    Sagduyu, Yalin
    Deng, Julia
    Li, Jason
    Liu, Peng
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS V, 2012, 8385