Deja Vu: Side-Channel Analysis of Mozilla's NSS

被引:0
|
作者
ul Hassan, Sohaib [1 ]
Gridin, Iaroslav [1 ]
Delgado-Lozano, Ignacio M. [1 ]
Garcia, Cesar Pereida [1 ]
Chi-Dominguez, Jesus-Javier [1 ]
Aldaya, Alejandro Cabrera [1 ]
Brumley, Billy Bob [1 ]
机构
[1] Tampere Univ, Tampere, Finland
基金
欧洲研究理事会;
关键词
applied cryptography; public key cryptography; DSA; ECDSA; RSA; side-channel analysis; lattice-based cryptanalysis; software security; NSS; CVE-2020-12399; CVE-2020-12402; CVE-2020-6829; CVE-2020-12401; KEY;
D O I
10.1145/3372297.3417891
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not done directly to them. In this work, we present another instance of this issue by performing the first library-wide SCA security evaluation of Mozilla's NSS security library. We use a combination of two independently-developed SCA security frameworks to identify and test security vulnerabilities. Our evaluation uncovers several new vulnerabilities in NSS affecting DSA, ECDSA, and RSA cryptosystems. We exploit said vulnerabilities and implement key recovery attacks using signals-extracted through different techniques such as timing, microarchitecture, and EM-and improved lattice methods.
引用
收藏
页码:1887 / 1902
页数:16
相关论文
共 50 条
  • [1] Detecting Privileged Side-Channel Attacks in Shielded Execution with Deja Vu
    Chen, Sanchuan
    Zhang, Xiaokuan
    Reiter, Michael K.
    Zhang, Yinqian
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 7 - 18
  • [2] The EM side-channel(s)
    Agrawal, D
    Archambeault, B
    Rao, JR
    Rohatgi, P
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 29 - 45
  • [3] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [4] Side-Channel Analysis of Montgomery's Representation Randomization
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 212 - 227
  • [5] On XTR and side-channel analysis
    Page, D
    Stam, M
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [6] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [7] A CONTRIBUTION TO THE ANALYSIS OF DEJA VU
    SCHNECK, JM
    JOURNAL OF NERVOUS AND MENTAL DISEASE, 1961, 132 (01) : 91 - 93
  • [8] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [9] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [10] Abacus: Precise Side-Channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Li, Xiaoting
    Larus, James R.
    Wu, Dinghao
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 797 - 809