home.social

#sidechannelattacks — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #sidechannelattacks, aggregated by home.social.

  1. Information and partnering event for the upcoming @Cyberagentur project Side-channel attacks with quantum sensing (SCA-QS) on June 10, 2024.
    Register until June 5, 2024: t1p.de/kn4cg
    More: t1p.de/mm8ly
    #cybersecurity #sidechannelattacks #SCA #quantumsensing

  2. Information and partnering event for the upcoming Cyberagentur project Side-channel attacks with quantum sensing (SCA-QS) on June 10, 2024.
    Register until June 5, 2024: www.cyberagentur.de/sca-qs
    #cybersecurity #sidechannelattacks #SCA #quantumsensing
    nachrichten.idw-online.de/2024

  3. Information and partnering event for the upcoming Cyberagentur project Side-channel attacks with quantum sensing (SCA-QS) on June 10, 2024.
    Register until June 5, 2024: www.cyberagentur.de/sca-qs/
    #cybersecurity #sidechannelattacks #SCA #quantumsensing

    nachrichten.idw-online.de/2024

  4. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  5. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  6. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  7. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  8. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  9. CW: research review

    G. Hu and R. Lee, "Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks"¹

    Cache side-channel attacks and speculative execution attacks that leak information through cache states are stealthy and dangerous attacks on hardware that must be mitigated. Unfortunately, defenses proposed for cache side-channel attacks do not mitigate all cache-based speculative execution attacks and vice versa. Since both classes of attacks must be addressed, we propose comprehensive cache architectures to do this.
    We show a framework to analyze the security of a secure cache. We identify same-domain speculative execution attacks, and show they evade cache side-channel defenses. We present new hardware security mechanisms that address target attacks and reduce performance overhead. We design two Speculative and Timing Attack Resilient (STAR) caches that defeat both cache side-channel attacks and cache-based speculative execution attacks. These comprehensive defenses have low performance overhead of 6.6% and 8.8%.

    #arXiv #ResearchPapers #SideChannelAttacks #Microarchitecture #SpeculativeExecution
    __
    ¹ arxiv.org/abs/2302.00732

  10. CW: research review

    G. Hu and R. Lee, "Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks"¹

    Cache side-channel attacks and speculative execution attacks that leak information through cache states are stealthy and dangerous attacks on hardware that must be mitigated. Unfortunately, defenses proposed for cache side-channel attacks do not mitigate all cache-based speculative execution attacks and vice versa. Since both classes of attacks must be addressed, we propose comprehensive cache architectures to do this.
    We show a framework to analyze the security of a secure cache. We identify same-domain speculative execution attacks, and show they evade cache side-channel defenses. We present new hardware security mechanisms that address target attacks and reduce performance overhead. We design two Speculative and Timing Attack Resilient (STAR) caches that defeat both cache side-channel attacks and cache-based speculative execution attacks. These comprehensive defenses have low performance overhead of 6.6% and 8.8%.

    #arXiv #ResearchPapers #SideChannelAttacks #Microarchitecture #SpeculativeExecution
    __
    ¹ arxiv.org/abs/2302.00732

  11. CW: research review

    A. Berzati et al., "A Practical Template Attack on CRYSTALS-Dilithium"¹

    This paper presents a new profiling side-channel attack on the signature scheme CRYSTALS-Dilithium, which has been selected by the NIST as the new primary standard for quantum-safe digital signatures. This algorithm has a constant-time implementation with consideration for side-channel resilience. However, it does not protect against attacks that exploit intermediate data leakage. We exploit such a leakage on a vector generated during the signing process and whose costly protection by masking is a matter of debate. We design a template attack that enables us to efficiently predict whether a given coefficient in one coordinate of this vector is zero or not. Once this value has been completely reconstructed, one can recover, using linear algebra methods, part of the secret key that is sufficient to produce universal forgeries. While our paper deeply discusses the theoretical attack path, it also demonstrates the validity of the assumption regarding the required leakage model, from practical experiments with the reference implementation on an ARM Cortex-M4.

    #IACR #ResearchPapers #Dilithium #Lattices #PQCryptography #SideChannelAttacks #TemplateAttacks
    __
    ¹ eprint.iacr.org/2023/050

  12. Researchers use Rowhammer bit flips to steal 2048-bit crypto key - Enlarge / A DDR3 DIMM with error-correcting code from Samsung. ECC is no longer an absolute defense... more: arstechnica.com/?p=1520383 #sidechannelattacks #memorychips #rowhammer #biz&it #dram #ddr