Bucketing and information flow analysis for provable timing attack mitigation

被引:0
|
作者
Terauchi, Tachio [1 ]
Antonopoulos, Timos [2 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
[2] Yale Univ, Dept Comp Sci, POB 2158, New Haven, CT 06520 USA
关键词
Side-channel attacks; timing attacks; bucketing; information flow; SIDE-CHANNEL COUNTERMEASURES; SAFETY; FOUNDATIONS;
D O I
10.3233/JCS-191356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the effect of bucketing in security against timing-channel attacks. Bucketing is a technique proposed to mitigate timing-channel attacks by restricting a system's outputs to only occur at designated time intervals, and has the effect of reducing the possible timing-channel observations to a small number of possibilities. However, there is little formal analysis on when and to what degree bucketing is effective against timing-channel attacks. In this paper, we show that bucketing is in general insufficient to ensure security. Then, we present two conditions that can be used to ensure security of systems against adaptive timing-channel attacks. The first is a general condition that ensures that the security of a system decreases only by a limited degree by allowing timing-channel observations, whereas the second condition ensures that the system would satisfy the first condition when bucketing is applied and hence becomes secure against timing-channel attacks. A main benefit of the conditions is that they allow separation of concerns whereby the security of the regular channel can be proven independently of concerns of side-channel information leakage, and certain conditions are placed on the side channel to guarantee the security of the whole system. Further, we show that the bucketing technique can be applied compositionally in conjunction with the constant-time-implementation technique to increase their applicability. While we instantiate our contributions to timing channel and bucketing, many of the results are actually quite general and are applicable to any side channels and techniques that reduce the number of possible observations on the channel. It is interesting to note that our results make non-trivial (and somewhat unconventional) uses of ideas from information flow research such as channel capacity and refinement order relation.
引用
下载
收藏
页码:607 / 634
页数:28
相关论文
共 50 条
  • [21] Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack
    Butora, Jan
    Bas, Patrick
    Cogranne, Remi
    PROCEEDINGS OF THE 2023 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2023, 2023, : 59 - 66
  • [22] Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
    Iavich, Maksim
    Kuchukhidze, Tamari
    CRYPTOGRAPHY, 2024, 8 (02)
  • [23] Attacks on ML Systems: From Security Analysis to Attack Mitigation
    Zou, Qingtian
    Zhang, Lan
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 119 - 138
  • [24] A detection method for cyber-attack on connected signal phase and timing information
    Hu, Jia
    Qi, Longqian
    Zhang, Zihan
    Yang, Xianfeng Terry
    Wang, Haoran
    Li, Xin
    TRANSPORTMETRICA B-TRANSPORT DYNAMICS, 2022, 10 (01) : 731 - 751
  • [25] Convergence-provable statistical timing analysis with level-sensitive latches and feedback loops
    Zhang, Lizheng
    Tsai, Jengliang
    Chen, Weijen
    Hu, Yuhen
    Chen, Charlie Chung-Ping
    ASP-DAC 2006: 11TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 2006, : 941 - 946
  • [26] Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security
    Tiwari, Mohit
    Oberg, Jason K.
    Li, Xun
    Valamehr, Jonathan
    Levin, Timothy
    Hardekopf, Ben
    Kastner, Ryan
    Chong, Frederic T.
    Sherwood, Timothy
    ISCA 2011: PROCEEDINGS OF THE 38TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, 2011, : 189 - 199
  • [27] Timing-based side-channel attack and mitigation on PCIe connected distributed embedded systems
    Khaliq, Salman Abdul
    Ali, Usman
    Khan, Omer
    2021 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2021,
  • [28] Quantitative analysis of sliding window attack for the RSA timing channel
    Mao B.
    Mu D.
    Hu W.
    Zhang H.
    Tai Y.
    Zhang L.
    1600, Science Press (44): : 114 - 120
  • [29] Analysis of Formation Attack based on Information Submarine
    Zhao, Yangyang
    Ma, Liang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTER SCIENCE (ICEMC 2016), 2016, 129 : 102 - 107
  • [30] Analysis and Mitigation of Process Variation Impacts on Power-Attack Tolerance
    Lin, Lang
    Burleson, Wayne
    DAC: 2009 46TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2009, : 238 - 243