Side-Channel Leakage across Borders
نویسندگان
چکیده
More and more embedded devices store sensitive information that is protected by means of cryptography. The confidentiality of this data is threatened by information leakage via side channels like the power consumption or the electromagnetic radiation. In this paper, we show that the side-channel leakage in the power consumption is not limited to the power-supply lines and that any input/output (I/O) pin can comprise secret information. The amount of leakage depends on the design and on the state of the I/O pin. All devices that we examined leaked secret information through their I/O pins. This implies that any I/O pin that is accessible for an adversary could be a security hole. Moreover, we demonstrate that the leakage is neither prevented by transmitter/receiver circuits as they are used in serial interfaces, nor by a galvanic isolation of a chip and its output signals via optocouplers. An adversary that is able to manipulate, for example, the pins of a PC’s I/O port, can attack any device that is connected to this port without being detected from outside.
منابع مشابه
Practical Memory Deduplication Attacks in Sandboxed Javascript
Page deduplication is a mechanism to reduce the memory footprint of a system. Identical physical pages are identified across borders of virtual machines and programs and merged by the operating system or the hypervisor. However, this enables side-channel information leakage through cache or memory access time. Therefore, it is considered harmful in public clouds today, but it is still considere...
متن کاملSide Channel Leakage Analysis
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...
متن کاملDifferentially private client-side data deduplication protocol for cloud storage services
Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage. However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users’ data. We propose a differentially private client-side deduplication protocol. A storage gateway allows efficient data ded...
متن کاملOn the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifically, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud environment allows mutually distrusting clients simultaneous access to the underlying hardware, a s...
متن کاملAcross-channel distribution of the mean and tidal flows in the Khuran Channel, Persian Gulf, Iran
The Khuran Channel, Southern Iran (26°45’N), is a topographically complex channel which is open at both ends. Owning to its particular geometry, this narrow channel is subjected to strong tidal currents.Across-channel distribution of the mean and tidal flows were obtained over a semidiurnal tidal cycle in the Khuran Channel where the highest tidal velocity in the third day of the seco...
متن کامل