An approach for isolating the sources of information leakage exploited in cache-based side-channel attacks

Atıcı, Ali Can and Yılmaz, Cemal and Savaş, Erkay (2013) An approach for isolating the sources of information leakage exploited in cache-based side-channel attacks. In: IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C 2013), Gaithersburg, MD

Full text not available from this repository. (Request a copy)

Abstract

We demonstrate that a certain class of side-channel attacks is feasible due to unintentional cache contentions between code segments in cryptographic applications. These inadvertent contentions should be considered as a flaw in the implementation of cryptographic applications, which necessitates a software analysis framework to identify their primary cause and check the effectiveness of proposed countermeasures. We present an approach to detect code segments in cryptographic applications that are in cache contentions with each other, thus leaking information that can be exploited in side-channel attacks to extract secret keys. To evaluate this approach, we conducted a series of experiments by using the well-known Bernstein's attack. Our results demonstrate, for the first time, that the primary source of exploitable information leakage in the Bernstein's AES server, rendering the attack a success, is the unintentional cache contentions between the parts of the OS kernel that handle network communications and the AES encryption code.
Item Type: Papers in Conference Proceedings
Uncontrolled Keywords: Software reliability; software security; side channel attacks
Subjects: Q Science > Q Science (General)
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Cemal Yılmaz
Date Deposited: 20 Jan 2014 15:12
Last Modified: 26 Apr 2022 09:13
URI: https://research.sabanciuniv.edu/id/eprint/23361

Actions (login required)

View Item
View Item