Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/51554

Registo completo
Campo DCValorIdioma
dc.contributor.authorAlmeida, José Bacelarpor
dc.contributor.authorBarbosa, Manuelpor
dc.contributor.authorBarthe, Gilles Jacques Denispor
dc.contributor.authorDupressoir, Francoispor
dc.date.accessioned2018-03-05T16:23:35Z-
dc.date.available2018-03-05T16:23:35Z-
dc.date.issued2016-07-
dc.identifier.isbn978-3-662-52992-8-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://hdl.handle.net/1822/51554-
dc.description.abstractWe provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the s2n library, recently released by AWS Labs. This bug ( now fixed) allowed bypassing the balancing countermeasures against timing attacks deployed in the implementation of the MAC-then-Encode-then-CBC-Encrypt (MEE-CBC) component, creating a timing side-channel similar to that exploited by Lucky 13.Although such an attack could only be launched when the MEE-CBC component is used in isolation - Albrecht and Paterson recently confirmed in independent work that s2n's second line of defence, once reinforced, provides adequate mitigation against current adversary capabilities - its existence serves as further evidence to the fact that conventional software validation processes are not effective in the study and validation of security properties. To solve this problem, we define a methodology for proving security of implementations in the presence of timing attackers: first, prove black-box security of an algorithmic description of a cryptographic construction; then, establish functional correctness of an implementation with respect to the algorithmic description; and finally, prove that the implementation is leakage secure.We present a proof-of-concept application of our methodology to MEE-CBC, bringing together three different formal verification tools to produce an assembly implementation of this construction that is verifiably secure against adversaries with access to some timing leakage. Our methodology subsumes previous work connecting provable security and side-channel analysis at the implementation level, and supports the verification of a much larger case study. Our case study itself provides the first provable security validation of complex timing countermeasures deployed, for example, in OpenSSL.por
dc.description.sponsorshipThe first two authors were funded by Project "TEC4Growth - Pervasive Intelligence, Enhancers and Proofs of Concept with Industrial Impact/ NORTE-01-0145-FEDER-000020", which is financed by the North Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement, and through the European Regional Development Fund (ERDF). The third and fourth authors were supported by projects S2013/ICE-2731 N-GREENS Software-CM and ONR Grants N000141210914 (AutoCrypt) and N00014151 2750 (SynCrypt). The fourth author was supported by FP7 Marie Cure Actions-COFUND 291803 (Amarout II). The machine-checked proof for CBC improves on a script by Benjamin Gregoire and Benedikt Schmidt. Pierre-Yves Strub provided support for extracting Why3 definitions from EasyCrypt specifications. We thank Mathias Pedersen and Bas Spitters for useful comments.por
dc.language.isoengpor
dc.publisherSpringer Verlagpor
dc.rightsopenAccesspor
dc.titleVerifiable side-channel security of cryptographic implementations: constant-time MEE-CBCpor
dc.typeconferencePaperpor
dc.peerreviewedyespor
oaire.citationStartPage163por
oaire.citationEndPage184por
oaire.citationVolume9783por
dc.date.updated2018-02-14T17:37:44Z-
dc.identifier.doi10.1007/978-3-662-52993-5_9por
dc.description.publicationversioninfo:eu-repo/semantics/publishedVersionpor
dc.subject.wosScience & Technology-
sdum.export.identifier2710-
sdum.journalLecture Notes in Computer Science (LNCS)por
sdum.conferencePublicationFast Software Encryption: 23rd International Conference, FSE 2016por
Aparece nas coleções:HASLab - Artigos em atas de conferências internacionais (texto completo)

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
16FSE_published.pdf396,21 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID