Deja Vu: Side-Channel Analysis of Mozilla's NSS

被引:0
|
作者
ul Hassan, Sohaib [1 ]
Gridin, Iaroslav [1 ]
Delgado-Lozano, Ignacio M. [1 ]
Garcia, Cesar Pereida [1 ]
Chi-Dominguez, Jesus-Javier [1 ]
Aldaya, Alejandro Cabrera [1 ]
Brumley, Billy Bob [1 ]
机构
[1] Tampere Univ, Tampere, Finland
基金
欧洲研究理事会;
关键词
applied cryptography; public key cryptography; DSA; ECDSA; RSA; side-channel analysis; lattice-based cryptanalysis; software security; NSS; CVE-2020-12399; CVE-2020-12402; CVE-2020-6829; CVE-2020-12401; KEY;
D O I
10.1145/3372297.3417891
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not done directly to them. In this work, we present another instance of this issue by performing the first library-wide SCA security evaluation of Mozilla's NSS security library. We use a combination of two independently-developed SCA security frameworks to identify and test security vulnerabilities. Our evaluation uncovers several new vulnerabilities in NSS affecting DSA, ECDSA, and RSA cryptosystems. We exploit said vulnerabilities and implement key recovery attacks using signals-extracted through different techniques such as timing, microarchitecture, and EM-and improved lattice methods.
引用
收藏
页码:1887 / 1902
页数:16
相关论文
共 50 条
  • [1] Detecting Privileged Side-Channel Attacks in Shielded Execution with Deja Vu
    Chen, Sanchuan
    Zhang, Xiaokuan
    Reiter, Michael K.
    Zhang, Yinqian
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 7 - 18
  • [2] The EM side-channel(s)
    Agrawal, D
    Archambeault, B
    Rao, JR
    Rohatgi, P
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 29 - 45
  • [3] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [4] Side-Channel Analysis of Montgomery's Representation Randomization
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 212 - 227
  • [5] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [6] On XTR and side-channel analysis
    Page, D
    Stam, M
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [7] A CONTRIBUTION TO THE ANALYSIS OF DEJA VU
    SCHNECK, JM
    [J]. JOURNAL OF NERVOUS AND MENTAL DISEASE, 1961, 132 (01) : 91 - 93
  • [8] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [9] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [10] Abacus: Precise Side-Channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Li, Xiaoting
    Larus, James R.
    Wu, Dinghao
    [J]. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 797 - 809