Descripción del proyecto
Análisis de canales laterales en computación en memoria para ingeniería inversa
El análisis de canales laterales (SCA, por sus siglas en inglés) es una técnica de criptoanálisis cuyo objetivo es ejecutar una primitiva criptográfica. Algunos ejemplos de canales laterales son el consumo de energía, la radiación electromagnética, las emisiones acústicas y varios tipos de sincronización. En el proyecto SCARE, financiado con fondos europeos, se trabajará para desarrollar una nueva generación de SCA que abarque ataques completos de extremo a extremo. Se identificarán vulnerabilidades específicas en bibliotecas de «software» de criptografía utilizadas de manera profusa, como OpenSSL, y tecnologías de seguridad asistidas por «hardware» como, por ejemplo, los entornos de ejecución confiables. Al proporcionar una nueva metodología para garantizar la seguridad de los SCA, se introducirá un método no invasivo de ingeniería inversa que aprovecha los SCA para extraer la IP a través de la ejecución de la novedosa computación en memoria.
Objetivo
"As the recent ""HeartBleed"" bug in OpenSSL demonstrates, the security of cryptographic software and devices cannot be understated. They build the foundation for basic security guarantees such as confidentiality and authentication, enabling technologies such as secure communication. For example, Transport Layer Security enables e-commerce, a 1.9 trillion USD global industry in 2016.
The more modern trend, especially in the embedded space, is towards hardware-assisted security. Here the aim is to leverage hardware to accomplish security goals that are simply unrealistic in software-only solutions. One example is Trusted Execution Environments (TEE) that provide a secure sandbox to execute security-critical software. TEEs, often driven by ARM TrustZone Technology, are present in the majority of smartphones on the market today.
Side-channel analysis (SCA) is a cryptanalytic technique that targets not the formal description of a cryptographic primitive but the implementation of it. Examples of side-channels include power consumption, electro-magnetic radiation, acoustic emanations, and various timings. Attackers then use this auxiliary signal to recover critical algorithm state and, in combination with cryptanalytic techniques, secret key material. This is a young but very active field within security and cryptography stemming from covert channels.
SCA is the focus of SCARE. Objectives include the discovery of next generation covert channels, paving the way for novel SCA classes, and extending these to full-fledged end-to-end SCA attacks by identifying specific vulnerabilities in widely-deployed cryptography software libraries such as OpenSSL and hardware-assisted security technologies such as TEEs. In turn, SCARE will deliver a methodology for SCA security assurance: not just development, evaluation, and deployment of acute countermeasures, but bringing SCA into the product life cycle as part of continuous integration."
Ámbito científico
- natural sciencescomputer and information sciencessoftware
- natural sciencescomputer and information sciencesinternettransport layer
- natural sciencescomputer and information sciencescomputer securitycryptography
- social scienceseconomics and businessbusiness and managementcommercee-commerce
- engineering and technologyelectrical engineering, electronic engineering, information engineeringinformation engineeringtelecommunicationsmobile phones
Palabras clave
Programa(s)
Régimen de financiación
ERC-STG - Starting GrantInstitución de acogida
33100 Tampere
Finlandia