title   
  

Methods for finding the sources of leakage in cache-timing attacks and removing the profiling phase

Warning The system is temporarily closed to updates for reporting purpose.

Atıcı, Ali Can (2018) Methods for finding the sources of leakage in cache-timing attacks and removing the profiling phase. [Thesis]

[img]
Preview
PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
1796Kb

Official URL: http://risc01.sabanciuniv.edu/record=b2057955 (Table of Contents)

Abstract

Cryptographic algorithms are widely used in daily life in order to ensure data confidentiality and privacy. These algorithms are extensively analyzed by scientists against a theoretical deficiency. However, these theoretically verified algorithms could still posses security risks if they are not cautiously implemented. Side-channel analysis can infer the secret key by using the information leakage due to implementation flaws. One of the most studied side-channel attack is the Bernstein’s cache-timing attack. This attack owes its reputation to its ability to succeed without a spy process, which is needed to create intentional cache contentions in other cache attacks. However, the exact leakage sources of the Bernstein’s attack remained uncertain to a large extent. Moreover, the need for an identical target system to perform its profiling phase makes the attack unrealistic for real world computing platforms. In this dissertation we address these two problems. Firstly, we propose a methodology to reveal the exact sources of the information leakage. The iv proposed methodology makes use of hardware performance counters to count the number of cache misses, to which the code blocks in the program are subject. Our methodology can help the developers analyze their implementations and fix their code in the early phases of the development. Secondly, we present an approach to extract simplified cache timing-behavior models analytically and propose to use these generated models instead of a profiling phase. The fact that the attack can be accomplished without a profiling phase will lead the attack to be considered a more realistic threat than the attack originally proposed by Bernstein. We believe that, this improved version of the attack will encourage the cryptographic system designers to take further precautions against the attack.

Item Type:Thesis
Uncontrolled Keywords:Side-channel analysis. -- Leakage sources. -- Hardware performance counters. -- Cache-timing attacks. -- Cache modeling. -- Profiling phase. -- Yan-kanal analizi. -- Sızıntı kaynakları. -- Donanım performans sayaçları. -- Önbellek-zamanlama saldırıları. -- Önbellek modelleme. -- Ayrımlama fazı.
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
ID Code:36859
Deposited By:IC-Cataloging
Deposited On:21 Feb 2019 09:55
Last Modified:22 May 2019 14:13

Repository Staff Only: item control page