谷歌Chrome浏览器插件
订阅小程序
在清言上使用

Déjà Vu: Side-Channel Analysis of Mozilla's NSS.

ACM Conference on Computer and Communications Security(2020)

引用 6|浏览32
暂无评分
摘要
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not done directly to them. In this work, we present another instance of this issue by performing the first library-wide SCA security evaluation of Mozilla's NSS security library. We use a combination of two independently-developed SCA security frameworks to identify and test security vulnerabilities. Our evaluation uncovers several new vulnerabilities in NSS affecting DSA, ECDSA, and RSA cryptosystems. We exploit said vulnerabilities and implement key recovery attacks using signals---extracted through different techniques such as timing, microarchitecture, and EM---and improved lattice methods.
更多
查看译文
关键词
applied cryptography, public key cryptography, DSA, ECDSA, RSA, side-channel analysis, lattice-based cryptanalysis, software security, NSS, CVE-2020-12399, CVE-2020-12402, CVE-2020-6829, CVE-2020-12401
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要