Evaluation of Timing Side-Channel Leakage on a Multiple-Target Dynamic Binary Translator
Resumo
Timing side-channel attacks are an important issue for cryptographic algorithms. If the execution time of an implementation depends on secret information, an adversary may recover the latter through measuring the former. Different approaches have emerged recently to exploit information leakage on cryptographic implementations and to protect them against these attacks. However, little has been said about ISA emulation and its impact on timing attacks. In this paper, we investigate the impact of an emulator (dynamic binary translator), OI-DBT, using different Region Formation Techniques (RFTs) on constant-time and non-constant-time implementations of cryptographic algorithms. We show that emulation can have a significant impact on secret leakages, even mitigating them in some cases. Moreover, our results indicate that the choice of RFT heuristic by the emulator does have an impact on these leakages.
Palavras-chave:
Emulation, Timing, Engines, Registers, Side-channel attacks, Prediction algorithms, Timing side-channel, Virtual Machines, JIT Compilation, Region Formation Techniques
Publicado
01/10/2018
Como Citar
NAPOLI, Otávio O.; DO ROSARIO, Vanderson Martins; ARANHA, Diego F.; BORIN, Edson.
Evaluation of Timing Side-Channel Leakage on a Multiple-Target Dynamic Binary Translator. In: SIMPÓSIO EM SISTEMAS COMPUTACIONAIS DE ALTO DESEMPENHO (SSCAD), 19. , 2018, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2018
.
p. 198-204.