defending humans against killers
play

Defending humans against killers Attack: We kill people based on - PowerPoint PPT Presentation

Defending humans against killers Attack: We kill people based on metadata. April 2014, Michael Hayden (DIRNSA 19992005; DIRCIA 20062009) Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e) Defending humans against killers


  1. Defending humans against killers Attack: “We kill people based on metadata.” —April 2014, Michael Hayden (DIRNSA 1999–2005; DIRCIA 2006–2009) Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  2. Defending humans against killers Attack: “We kill people based on metadata.” —April 2014, Michael Hayden (DIRNSA 1999–2005; DIRCIA 2006–2009) Countermeasure: Eliminate the metadata. Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  3. Defending humans against killers Attack: “We kill people based on metadata.” —April 2014, Michael Hayden (DIRNSA 1999–2005; DIRCIA 2006–2009) Countermeasure: Eliminate the metadata. But do they also kill people based on content? Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  4. Defending crypto libraries against side-channel attacks Crypto libraries leak secrets through metadata. e.g. 2012 CRI DEMA attack against smartphones extracted secrets from timing of memory accesses. Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  5. Defending crypto libraries against side-channel attacks Crypto libraries leak secrets through metadata. e.g. 2012 CRI DEMA attack against smartphones extracted secrets from timing of memory accesses. Countermeasure: Eliminate the metadata. No secret memory addresses, no secret branch conditions. e.g. NaCl crypto library (Bernstein–Lange–Schwabe). Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  6. Defending crypto libraries against side-channel attacks Crypto libraries leak secrets through metadata. e.g. 2012 CRI DEMA attack against smartphones extracted secrets from timing of memory accesses. Countermeasure: Eliminate the metadata. No secret memory addresses, no secret branch conditions. e.g. NaCl crypto library (Bernstein–Lange–Schwabe). Which secrets still leak via data being processed? How can we defend crypto libraries against these leaks? Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  7. Defending crypto libraries against side-channel attacks Crypto libraries leak secrets through metadata. e.g. 2012 CRI DEMA attack against smartphones extracted secrets from timing of memory accesses. Countermeasure: Eliminate the metadata. No secret memory addresses, no secret branch conditions. e.g. NaCl crypto library (Bernstein–Lange–Schwabe). Which secrets still leak via data being processed? How can we defend crypto libraries against these leaks? News (Bernstein–Bekkers–Lange): successful EM extraction of secrets from constant-time software running on fast ARMs . Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  8. SRAM data on fast ARM → EM → key recovery Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

  9. Arithmetic data on fast ARM → EM → key recovery Daniel J. Bernstein (UIC, TU/e) and Tanja Lange (TU/e)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend