comp.lang.ada
 help / color / mirror / Atom feed
From: Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP>
Subject: Re: Side-channel Attacks (Time)
Date: Fri, 25 Apr 2014 19:43:46 +0000 (UTC)
Date: 2014-04-25T19:43:46+00:00	[thread overview]
Message-ID: <ljedti$vhg$1@dont-email.me> (raw)
In-Reply-To: Mvm6v.100857$Vl4.44401@fx10.iad

On 2014-04-25, Shark8 <OneWingedShark@gmail.com> wrote:
> On 24-Apr-14 23:09, Pascal J. Bourguignon wrote:
>> Shark8 <OneWingedShark@gmail.com> writes:
>>
>>> Considering the needs for a secure, verified security library [to
>>> replace OpenSSL] I was wondering about using the TASK construct in
>>> conjunction with DELAY UNTIL /OP_UPPERBOUND/* would be an acceptable
>>> countermeasure.
>>
>> It could help.
>>
>> Choosing an algorithm without branches, and with fixed count loops would
>> be better.
>
> Hm, there's a thought.
> I rather do like the DELAY UNTIL solution as it concisely states the 
> intention as a timing-attack countermeasure. (Though I've got pretty 
> much no experience in real-time systems, so I can't say if it's actually 
> appropriate.)
>

The problem is that you are making assumptions about the environment
your code is running in when you determine how long something is going
to take.

The static values you come up with for a 3GHz desktop processor will be
very different from the values you need for a 100MHz (or even less)
embedded system, which makes the values you choose fragile when they are
used in different environments.

If, OTOH, you try to calculate some dynamic values at program startup
time which reflect the system you are running on, then you are vulnerable
to bad values calculated due to varying system load.

I wonder if you could achieve what you want by introducing random
micro-delays into the calculations themselves ?

Simon.

-- 
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world


      parent reply	other threads:[~2014-04-25 19:43 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-04-25  4:28 Side-channel Attacks (Time) Shark8
2014-04-25  5:09 ` Pascal J. Bourguignon
2014-04-25  5:36   ` Shark8
2014-04-25  5:51     ` Pascal J. Bourguignon
2014-04-25  6:26       ` Shark8
2014-04-25 19:43     ` Simon Clubley [this message]
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox