首页> 外文期刊>ACM Transaction on Information and System Security >Utilizing Performance Counters for Compromising Public Key Ciphers
【24h】

Utilizing Performance Counters for Compromising Public Key Ciphers

机译:利用性能计数器破坏公钥密码

获取原文
获取原文并翻译 | 示例

摘要

Hardware performance counters (HPCs) are useful artifacts for evaluating the performance of software implementations. Recently, HPCs have been made more convenient to use without requiring explicit kernel patches or superuser privileges. However, in this article, we highlight that the information revealed by HPCs can be also exploited to attack standard implementations of public key algorithms. In particular, we analyze the vulnerability due to the event branch miss leaked via the HPCs during execution of the target ciphers. We present an iterative attack that targets the key bits of 1,024-bit RSA and 256-bit ECC, whereas in the offline phase, the system's underlying branch predictor is approximated by a theoretical predictor in the literature. Subsimulations are performed corresponding to each bit guess to classify the message space into distinct partitions based on the event branch misprediction and the target key bit value. In the online phase, branch mispredictions obtained from the hardware performance monitors on the target system reveal the secret key bits. We also theoretically prove that the probability of success of the attack is equivalent to the accurate modeling of the theoretical predictor to the underlying system predictor. In addition, we propose an improved version of the attack that requires fewer branch misprediction traces from the HPCs to recover the secret. Experimentations using both attack strategies have been provided on Intel Core 2 Duo, Core i3, and Core i5 platforms for 1,024-bit implementation of RSA and 256-bit scalar multiplication over the secp256r1 curve followed by results on the effect of change of parameters on the success rate. The attack can successfully reveal the exponent bits and thus seeks attention to model secure branch predictors such that it inherently prevents information leakage.
机译:硬件性能计数器(HPC)是评估软件实现的性能的有用工件。最近,HPC变得更易于使用,而无需显式内核补丁或超级用户特权。但是,在本文中,我们强调指出,还可以利用HPC揭示的信息来攻击公钥算法的标准实现。特别是,我们分析了由于目标密码执行期间通过HPC泄漏的事件分支未命中而导致的漏洞。我们提出了一种针对1,024位RSA和256位ECC的关键位的迭代攻击,而在离线阶段,系统的基础分支预测变量由文献中的理论预测变量近似。对应于每个比特猜测执行子模拟,以基于事件分支错误预测和目标密钥比特值将消息空间分类为不同的分区。在联机阶段,从目标系统上的硬件性能监视器获得的分支错误预测会揭示秘密密钥位。从理论上讲,我们还证明攻击成功的可能性等同于将理论预测器精确建模为基础系统预测器。另外,我们提出了一种改进的攻击版本,该攻击需要更少的来自HPC的分支错误预测跟踪来恢复机密。在Intel Core 2 Duo,Core i3和Core i5平台上提供了使用这两种攻击策略的实验,用于1,024位RSA的实现和secp256r1曲线上的256位标量乘法,随后是参数改变对secp256r1曲线的影响。成功率。攻击可以成功揭示指数位,从而引起人们对模型安全分支预测器的关注,从而从本质上防止信息泄漏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号