side channel attacks in a microkernel environment
play

Side-channel attacks in a microkernel environment Thomas Frase - PowerPoint PPT Presentation

Side-channel attacks in a microkernel environment Thomas Frase Thomas.b.Frase@student.hs-rm.de Fabian Seiberling Fabian.b.Seiberling@student.hs-rm.de 1st Wiesbaden Workshop on 13.02.2014 Advanced Microkernel Operating Systems Table of


  1. Side-channel attacks in a microkernel environment Thomas Frase Thomas.b.Frase@student.hs-rm.de Fabian Seiberling Fabian.b.Seiberling@student.hs-rm.de 1st Wiesbaden Workshop on 13.02.2014 Advanced Microkernel Operating Systems

  2. Table of contents 2 Introduction 1 2 Public Key Cryptography 3 Side-channel Attacks Real-world Examples 4 Conclusion 5

  3. Introduction 3 Side-channel attacks use the physical implementation of a cryptographic function to gain information about the key. Cryptographic Implementation Ciphertext Decryption function Message Key Side-channel information Side-channel attack

  4. Public Key Cryptography 4 Alice Bob Generate big primes p and q

  5. Public Key Cryptography 4 Alice Bob Calculate n = p · q

  6. Public Key Cryptography 4 Alice Bob Find e with gcd ( e , n ) = 1

  7. Public Key Cryptography 4 Alice Bob Find d with e · d ≡ 1 ( mod n )

  8. Public Key Cryptography 4 Alice Bob Public key: ( e , n ) Private key: ( d , n )

  9. Public Key Cryptography 4 Public Key ( e , n ) Alice Bob

  10. Public Key Cryptography 4 Alice Bob Encrypt mes- sage: c = m e ( mod n )

  11. Public Key Cryptography 4 Encrypted message c Alice Bob

  12. Public Key Cryptography 4 Alice Bob Decrypt mes- sage: m = c d ( mod n )

  13. Exponentiation by squaring 5 Algorithm Input : c , d , n Output : m let d 1 , ..., d n be the bits of d ; let bits ( x ) be the bit-length of x ; m ← 1; for i = bits ( d ) down to 1 do m ← m 2 ( mod n ) ; if d i = 1 then m ← m · c ( mod n ) ; end end

  14. Side-channel Attacks 6 Types of side channel attacks: Acoustic cryptanalysis Data remanence Differential fault analysis Electromagnetic attacks Power monitoring attack Timing attack

  15. Side-channel Attacks 7 Acoustic cryptanalysis Attacks which use the noise emitted by the computer while using the cryptographic function. Data remanence attacks which use to read the data which was used by a cryptographic function. The data can be restored after the cryptographic function delete them.

  16. Side-channel Attacks 8 Differential fault analysis This attack create a fault in the cryptographic function to gain information about the current state of the function. A fault can be created with high temperature, to high or low voltage or with electric or magnetic fields. Electromagnetic attacks Attacks which use the electromagnetic field to gain information about the secret of the cryptographic function.

  17. Side-channel Attacks 9 Power monitoring attack This attack used the characteristic of the power consumption for each instruction of the CPU. Timing attack Attacks which measure the execution time of parts of the cryptographic function to gain information.

  18. Example: Power monitoring attack 10 Square-and-multiply algorithm Different amount of power Digital oscilloscope Differential power analysis

  19. Acoustic Attack 11 Genkin, Shamir and Tromer RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Extraction of full 4096-bit RSA key Attack using various microphones Uses adaptive chosen-ciphertext Target: GnuPG on Laptops

  20. Acoustic Attack 12 Electrical components produce high-frequency noise Voltage regulator noise depends heavily on CPU instructions / load Various CPU instructions distinguishable in acoustic spectrum

  21. Acoustic Attack 13 GnuPG uses optimization (RSA-CRT) m p = c d p m q = c d q ( mod p ) ( mod q ) Attack targets each bit of q individually Choose c Determine q i = 1 or q i = 0 Modify c according to last step Repeat Factorize n from q

  22. Acoustic Attack 14 Consequences for microkernels? Attack is independent of operating system Mitigation best done on algorithm-level Self-eavesdropping can be mitigated by considering the microphone a security critical resource

  23. Access-driven Cross-VM Attack 15 Yinqian, Juels, Reiter, and Ristenpart Cross-VM Side Channels and Their Use to Extract Private Keys Almost complete extraction of private key Required brute-force search of about 10,000 keys Target: GnuPG in a Xen-based VM

  24. Access-driven Cross-VM Attack 16 Attacker and victim on different guest VMs Attacker spies on the instruction cache Cache-based delays reveals used code paths in victim

  25. Access-driven Cross-VM Attack 17 Preempting the victim Noise-reduction Classification SVM (Support vector machines) HMM (Hidden Markov model) Fragment stitching

  26. Access-driven Cross-VM Attack 18 Consequences for microkernels? Side-channel resistant algorithms Scheduling Make it hard for the attacker to preempt the victim Flushing caches Flush instruction cache on context switch for critical tasks

  27. Conclusion 19 Side-channel attacks can be used on a microkernel Some attacks can be prevented by additional security Implementations on the microkernel Some attacks can only prevented by changing the Implementation of the cryptographic function

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend