首页> 外文会议>2018 Symposium on High Performance Computing Systems >Evaluation of Timing Side-Channel Leakage on a Multiple-Target Dynamic Binary Translator
【24h】

Evaluation of Timing Side-Channel Leakage on a Multiple-Target Dynamic Binary Translator

机译:多目标动态二进制转换器上的定时侧通道泄漏评估

获取原文
获取原文并翻译 | 示例

摘要

Timing side-channel attacks are an important issue for cryptographic algorithms. If the execution time of an implementation depends on secret information, an adversary may recover the latter through measuring the former. Different approaches have emerged recently to exploit information leakage on cryptographic implementations and to protect them against these attacks. However, little has been said about ISA emulation and its impact on timing attacks. In this paper, we investigate the impact of an emulator (dynamic binary translator), OI-DBT, using different Region Formation Techniques (RFTs) on constant-time and non-constant-time implementations of cryptographic algorithms. We show that emulation can have a significant impact on secret leakages, even mitigating them in some cases. Moreover, our results indicate that the choice of RFT heuristic by the emulator does have an impact on these leakages.
机译:定时边信道攻击是密码算法的重要问题。如果实施的执行时间取决于机密信息,则攻击者可以通过测量前者来恢复后者。最近出现了不同的方法来利用加密实现中的信息泄漏,并保护它们免受这些攻击。但是,关于ISA仿真及其对定时攻击的影响还很少。在本文中,我们研究了使用不同区域形成技术(RFT)的仿真器(动态二进制翻译器)OI-DBT对密码算法的恒定时间和非恒定时间实现的影响。我们表明,仿真可以对秘密泄漏产生重大影响,甚至在某些情况下可以缓解泄漏。此外,我们的结果表明,仿真器对RFT启发式的选择确实会对这些泄漏产生影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号