ECS 235B, Lecture 26
March 13, 2019
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 1
ECS 235B, Lecture 26 March 13, 2019 March 13, 2019 ECS 235B, - - PowerPoint PPT Presentation
ECS 235B, Lecture 26 March 13, 2019 March 13, 2019 ECS 235B, Foundations of Computer and Information Security 1 State Machine Model: 2-Bit Machine Levels High , Low , meet 4 properties: 1. For every input i k , state s j , there is an element c
March 13, 2019
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 1
Levels High, Low, meet 4 properties:
T*(cm, sj) = sn, where sn ≠ sj T* is total function, inputs and commands always move system to a different state
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 2
from si to sj, then si º sj
commands
to transition to si¢, then there is a state sj¢ such that si¢ º sj¢ and inputs i1, …, in cause system in state sj to transition to sj¢
states have same LOW projection
ºholds if LOW projections of both states are same
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 3
state si transitioned to state si¢, then for some state sj¢ with sj¢ º si¢, sequence of HIGH outputs o1¢, …, om¢ indicates system in sj transitioned to sj¢
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 4
sequence ced indicates system in state si transitions to si¢, then there are HIGH
sj transitions to state sj¢
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 5
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 6
effect as the LOW input, so composition of restrictive systems should be restrictive
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 7
conditions hold
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 8
1. M1 in state µ1a and e occurs, M1 transitions to µ1b; e not an event for M2; and µ2a = µ2b 2. M2 in state µ2a and e occurs, M2 transitions to µ2b; e not an event for M1; and µ1a = µ1b 3. M1 in state µ1a and e occurs, M1 transitions to µ1b; M2 in state µ2a and e occurs, M2 transitions to µ2b; e is input to one machine, and output from other
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 9
least 1 of the components
transition in other component when not connected to the composite system
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 10
(sa, sb) ºC (sc, sd) iff sa º sc and sb º sd
system
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 11
The system resulting from the composition of two restrictive systems is itself restrictive
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 12
A side channel is set of characteristics of a system, from which adversary can deduce confidential information about system or a competition
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 13
from measurements of disruption
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 14
x := 1; atmp := a; for i := 0 to k-1 do begin if zi = 1 then x := (x * atmp) mod n; atmp := (atmp * atmp) mod n; end; result := x;
computation time
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 15
Background
goes to memory
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 16
Phase 1
caches
Phase 2
Phase 3
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 17
What happened
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 18
Components
mechanism to monitor the physical observables
function
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 19
etc.)
ways
noise
virtual machines, hence more noise
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 20
reconstruct the images
impaired voters) produced interference with sound from a nearby transistor radio
to determine how voter was vioting
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 21
LOW outputs
March 13, 2019 ECS 235B, Foundations of Computer and Information Security 22