Side channel vulnerability metrics: the promise and the pitfalls

  • Authors:
  • Tianwei Zhang;Fangfei Liu;Si Chen;Ruby B. Lee

  • Affiliations:
  • Princeton University;Princeton University;Princeton University;Princeton University

  • Venue:
  • Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Side-channels enable attackers to break a cipher by exploiting observable information from the cipher program's execution to infer its secret key. While some defenses have been proposed to protect information leakage due to certain side channels, the effectiveness of these defenses have mostly been given only qualitative analysis by their authors. It is desirable to have a general quantitative method and metric to evaluate a system's vulnerability to side-channel attacks. In this paper, we define the features of a good side-channel leakage metric. We review a recently proposed metric called the Side-channel Vulnerability Factor (SVF) and discuss its merits and issues. We suggest the CSV metric, which tries to show how to overcome some of the shortcomings of the SVF metric, without completely changing its character. We use software cache side-channel attacks and defenses as an example to compare the metrics with known and measurable results on system leakiness.