Cache-timing attacks still threaten IoT devices

  • Sofiane Takarabt
  • , Alexander Schaub
  • , Adrien Facon
  • , Sylvain Guilley
  • , Laurent Sauvage
  • , Youssef Souissi
  • , Yves Mathieu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Deployed widely and embedding sensitive data, The security of IoT devices depend on the reliability of cryptographic libraries to protect user information. However when implemented on real systems, cryptographic algorithms are vulnerable to side-channel attacks based on their execution behavior, which can be revealed by measurements of physical quantities such as timing or power consumption. Some countermeasures can be implemented in order to prevent those attacks. However those countermeasures are generally designed at high level description, and when implemented, some residual leakage may persist. In this article we propose a methodology to assess the robustness of the MbedTLS library against timing and cache-timing attacks. This comprehensive study of side-channel security allows us to identify the most frequent weaknesses in software cryptographic code and how those might be fixed. This methodology checks the whole source code, from the top level routines to low level primitives, that are used for the final application. We retrieve hundreds of lines of code that leak sensitive information.

Original languageEnglish
Title of host publicationCodes, Cryptology and Information Security - 3rd International Conference, C2SI 2019, Proceeding
EditorsSylvain Guilley, Claude Carlet, El Mamoun Souidi, Abderrahmane Nitaj
PublisherSpringer Verlag
Pages13-30
Number of pages18
ISBN (Print)9783030164577
DOIs
Publication statusPublished - 1 Jan 2019
Externally publishedYes
Event3rd International Conference on Codes, Cryptology and Information Security, C2SI 2019 - Rabat, Morocco
Duration: 22 Apr 201924 Apr 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11445 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Codes, Cryptology and Information Security, C2SI 2019
Country/TerritoryMorocco
CityRabat
Period22/04/1924/04/19

Fingerprint

Dive into the research topics of 'Cache-timing attacks still threaten IoT devices'. Together they form a unique fingerprint.

Cite this