Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

DATA - Differential address trace analysis: Finding address-based side-channels in binaries

 
: Weiser, S.; Zankl, A.; Spreitzer, R.; Miller, K.; Mangard, S.; Sigl, G.

USENIX Association:
27th USENIX Security Symposium 2018. Proceedings : August 15-17, 2018, Baltimore, MD, USA
Berkeley, CA, USA: USENIX, 2018
ISBN: 978-1-931971-46-1
ISBN: 978-1-93913304-5
pp.603-620
Security Symposium <27, 2018, Baltimore/Md.>
English
Conference Paper
Fraunhofer AISEC ()

Abstract
Cryptographic implementations are a valuable target for address-based side-channel attacks and should, thus, be protected against them. Countermeasures, however, are often incorrectly deployed or completely omitted in practice. Moreover, existing tools that identify information leaks in programs either suffer from imprecise abstraction or only cover a subset of possible leaks. We systematically address these limitations and propose a new methodology to test software for information leaks. In this work, we present DATA, a differential address trace analysis framework that detects address-based side-channel leaks in program binaries. This accounts for attacks exploiting caches, DRAM, branch prediction, controlled channels, and likewise. DATA works in three phases. First, the program under test is executed to record several address traces. These traces are analyzed using a novel algorithm that dynamically re-aligns traces to increase detection accuracy. Second, a generic leakage test filters differences caused by statistically independent program behavior, e.g., randomization, and reveals true information leaks. The third phase classifies these leaks according to the information that can be obtained from them. This provides further insight to security analysts about the risk they pose in practice. We use DATA to analyze OpenSSL and PyCrypto in a fully automated way. Among several expected leaks in symmetric ciphers, DATA also reveals known and previously unknown leaks in asymmetric primitives (RSA, DSA, ECDSA), and DATA identifies erroneous bug fixes of supposedly fixed constant-time vulnerabilities.

: http://publica.fraunhofer.de/documents/N-581750.html