Abstract
We demonstrate that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security. Surveying several widely deployed software libraries, we investigate the formats they support, how they parse these keys, and what runtime decisions they make. We uncover a combination of weaknesses and vulnerabilities, in extreme cases inducing completely disjoint multi-precision arithmetic stacks deep within the cryptosystem level for keys that otherwise seem logically equivalent. Exploiting these vulnerabilities, we design and implement key recovery attacks utilizing signals ranging from electromagnetic (EM) emanations, to granular microarchitecture cache timings, to coarse traditional wall clock timings.
Original language | English |
---|---|
Title of host publication | 29th USENIX Security Symposium, USENIX Security 2020 |
Publisher | USENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION |
Pages | 2021-2038 |
Number of pages | 18 |
ISBN (Print) | 978-1-939133-17-5 |
Publication status | Published - 2020 |
Publication type | A4 Article in conference proceedings |
Event | USENIX Security Symposium - Duration: 12 Aug 2020 → 14 Aug 2020 |
Conference
Conference | USENIX Security Symposium |
---|---|
Period | 12/08/20 → 14/08/20 |
Publication forum classification
- Publication forum level 1