Coping with Outside-the-Box Attacks

  • Authors:
  • Edward W. Felten

  • Affiliations:
  • Department of Computer Science and Woodrow Wilson School of Public and International Affairs, Princeton University,

  • Venue:
  • CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

There is a long history of security attacks that succeed by violating the system designer's assumptions about how things work. Even if a designer does everything right--within the "obvious" model--such attacks can still succeed. How can we, as designers and verifiers of systems, cope with these "outside-the-box" attacks?The classic examples of assumption-violating attacks are the timing attacks on cryptosystems first introduced by Kocher [1]. Cryptosystems are designed so that an attacker who has black-box access to an implementation (and does not know the secret key) cannot deduce the key. Extensive mathematical analysis of the input-output behavior of cryptographic functions led to the belief (though unfortunately not proof) that an attacker who can observe the input-output behavior of cryptosystems cannot feasibly find the secret key. Kocher showed that even if this is true, the running time of common cryptographic algorithms does depend on the secret key. Though the dependence of running time on the key is complex, Kocher showed how to use randomized experiments to extract enough signal to deduce the key, at least in principle. Brumley and Boneh later showed that such attacks are practical, even across a network[2].