Bucketing and information flow analysis for provable timing attack mitigation

被引:0
|
作者
Terauchi, Tachio [1 ]
Antonopoulos, Timos [2 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
[2] Yale Univ, Dept Comp Sci, POB 2158, New Haven, CT 06520 USA
关键词
Side-channel attacks; timing attacks; bucketing; information flow; SIDE-CHANNEL COUNTERMEASURES; SAFETY; FOUNDATIONS;
D O I
10.3233/JCS-191356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the effect of bucketing in security against timing-channel attacks. Bucketing is a technique proposed to mitigate timing-channel attacks by restricting a system's outputs to only occur at designated time intervals, and has the effect of reducing the possible timing-channel observations to a small number of possibilities. However, there is little formal analysis on when and to what degree bucketing is effective against timing-channel attacks. In this paper, we show that bucketing is in general insufficient to ensure security. Then, we present two conditions that can be used to ensure security of systems against adaptive timing-channel attacks. The first is a general condition that ensures that the security of a system decreases only by a limited degree by allowing timing-channel observations, whereas the second condition ensures that the system would satisfy the first condition when bucketing is applied and hence becomes secure against timing-channel attacks. A main benefit of the conditions is that they allow separation of concerns whereby the security of the regular channel can be proven independently of concerns of side-channel information leakage, and certain conditions are placed on the side channel to guarantee the security of the whole system. Further, we show that the bucketing technique can be applied compositionally in conjunction with the constant-time-implementation technique to increase their applicability. While we instantiate our contributions to timing channel and bucketing, many of the results are actually quite general and are applicable to any side channels and techniques that reduce the number of possible observations on the channel. It is interesting to note that our results make non-trivial (and somewhat unconventional) uses of ideas from information flow research such as channel capacity and refinement order relation.
引用
下载
收藏
页码:607 / 634
页数:28
相关论文
共 50 条
  • [31] Attack Detection and Mitigation for Resilient Distributed DC Optimal Power Flow in the IoT Environment
    Duan, Jie
    Zeng, Wente
    Chow, Mo-Yuen
    PROCEEDINGS 2016 IEEE 25TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2016, : 606 - 611
  • [32] Detection, Mitigation, Recovery of GPS based Assured Timing Critical Infrastructure when under attack by Spoofing or Jamming
    Diamond, Patrick
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [33] Automated analysis of timing information in UML diagrams
    Konrad, S
    Campbell, LA
    Cheng, BHC
    19TH INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 350 - 353
  • [34] Fisher information analysis of digital pulse timing
    Ruiz-Gonzalez, Maria
    Furenlid, Lars R.
    MEDICAL APPLICATIONS OF RADIATION DETECTORS V, 2015, 9594
  • [35] Fisher information analysis of digital pulse timing
    Ruiz-Gonzalez, Maria
    Furenlid, Lars R.
    2015 IEEE NUCLEAR SCIENCE SYMPOSIUM AND MEDICAL IMAGING CONFERENCE (NSS/MIC), 2015,
  • [36] Information flow dynamics and timing patterns in the arrival of email viruses
    Liebovitch, LS
    Schwartz, IB
    PHYSICAL REVIEW E, 2003, 68 (01):
  • [37] Using Information Flow to Design an ISA that Controls Timing Channels
    Zagieboylo, Drew
    Suh, G. Edward
    Myers, Andrew C.
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 272 - 287
  • [38] Quantifying Timing-Based Information Flow in Cryptographic Hardware
    Mao, Baolei
    Hu, Wei
    Althoff, Alric
    Matai, Janarbek
    Oberg, Jason
    Mu, Dejun
    Sherwood, Timothy
    Kastner, Ryan
    2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 552 - 559
  • [39] Timing Jitter Analysis and Mitigation in Hybrid OFDM-DFMA PONs
    Gonem, Omaro Fawzi Abdelhamid
    Giddings, Roger Philip
    Tang, Jianming
    IEEE PHOTONICS JOURNAL, 2021, 13 (06):
  • [40] Detection and Mitigation Of Malicious Java']JavaScript Using Information Flow Control
    Sayed, Bassam
    Traore, Issa
    Abdelhalim, Amany
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 264 - 273