2019 IEEE 32nd Computer Security Foundations Symposium (CSF) 2019
DOI: 10.1109/csf.2019.00010
|View full text |Cite
|
Sign up to set email alerts
|

Timing Leaks and Coarse-Grained Clocks

Abstract: Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed countermeausure against such attacks is to reduce the accuracy of the clocks that are available to adversaries. While a number of high-profile attacks show that this mitigation can be side-stepped, there has not been a principled analysis of the degree of security it provides until now.In this paper, we perform the first information-flow analysis with res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 25 publications
(47 reference statements)
0
5
0
Order By: Relevance
“…In [Vas+19], Vasilikos et al study the impact of clock granularity on timing channel attacks. Timing side-channels attacks are closely related to non-interference, as an attacker is able to deduce internal information about a system by accessing some publicly available data-notably time.…”
Section: Non-interference and Information Flowmentioning
confidence: 99%
See 1 more Smart Citation
“…In [Vas+19], Vasilikos et al study the impact of clock granularity on timing channel attacks. Timing side-channels attacks are closely related to non-interference, as an attacker is able to deduce internal information about a system by accessing some publicly available data-notably time.…”
Section: Non-interference and Information Flowmentioning
confidence: 99%
“…Here, by "clock granularity", we mean clock as in processor clock that ticks periodically (different from the abstract concept of "timed automata clocks"). The authors in [Vas+19] notably propose a modeling based on timed automata with stochastic conditions, and they provide sufficient conditions "for when one can achieve better security by increasing the grain of the clock". The authors describe stochastic systems with the help of probabilistic TAs, and provide an algorithm for obtaining, given an attack scenario on a deterministic system, the timing channels along with their respective probability of occurrence.…”
Section: Non-interference and Information Flowmentioning
confidence: 99%
“…Note that our attacker may combine both differential-and absolutetime capabilities because programs have access to real-time clocks. Vasilikos et al [59] utilize time automata to study adversaries parametrized in the granularity of the clock. Practical remote timing attacks Remote timing attacks are (still) practical [22], [23].…”
Section: Related Workmentioning
confidence: 99%
“…All of the cache side channel attacks need the high resolution timer to measure the time of cache accesses, thus some operating systems or browsers provide a coarse timer only to enhance security. But Schwarz et al propose that the attacker can utilize other timing primitives to build a new high resolution timer [22], and Vasilikos et al show that coarse timer may leak more information by analyzing the information flow model of the attacks [23].…”
Section: Cache Side Channel Security Mechanismsmentioning
confidence: 99%