Skip to main content

Showing 1–24 of 24 results for author: Yarom, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.00641  [pdf, other

    cs.CR

    Testing side-channel security of cryptographic implementations against future microarchitectures

    Authors: Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom

    Abstract: How will future microarchitectures impact the security of existing cryptographic implementations? As we cannot keep reducing the size of transistors, chip vendors have started develo** new microarchitectural optimizations to speed up computation. A recent study (Sanchez Vicarte et al., ISCA 2021) suggests that these optimizations might open the Pandora's box of microarchitectural attacks. Howeve… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  2. arXiv:2401.17628  [pdf, other

    cs.CR

    Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget

    Authors: Jiankai **, Chitchanok Chuengsatiansup, Toby Murray, Benjamin I. P. Rubinstein, Yuval Yarom, Olga Ohrimenko

    Abstract: Current implementations of differentially-private (DP) systems either lack support to track the global privacy budget consumed on a dataset, or fail to faithfully maintain the state continuity of this budget. We show that failure to maintain a privacy budget enables an adversary to mount replay, rollback and fork attacks - obtaining answers to many more queries than what a secure system would allo… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  3. arXiv:2401.13575  [pdf, other

    cs.CR cs.LG

    CNN architecture extraction on edge GPU

    Authors: Peter Horvath, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom

    Abstract: Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural language processing, speech recognition, forecasting, etc. These applications are also used in resource-constrained environments such as embedded devices. In this work, the susceptibility of neural network implementations to reverse engineering is ex… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: Will appear at the AIHWS 2024 workshop at ACNS 2024

    Report number: AIHWS008

  4. arXiv:2312.07783  [pdf, other

    cs.CR

    BarraCUDA: GPUs do Leak DNN Weights

    Authors: Peter Horvath, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom

    Abstract: Over the last decade, applications of neural networks (NNs) have spread to various aspects of our lives. A large number of companies base their businesses on building products that use neural networks for tasks such as face recognition, machine translation, and self-driving cars. Much of the intellectual property underpinning these products is encoded in the exact parameters of the neural networks… ▽ More

    Submitted 27 February, 2024; v1 submitted 12 December, 2023; originally announced December 2023.

  5. arXiv:2307.09001  [pdf, other

    cs.CR

    On Borrowed Time -- Preventing Static Power Side-Channel Analysis

    Authors: Robert Dumitru, Andrew Wabnitz, Yuval Yarom

    Abstract: In recent years, static power side-channel analysis attacks have emerged as a serious threat to cryptographic implementations, overcoming state-of-the-art countermeasures against side-channel attacks. The continued down-scaling of semiconductor process technology, which results in an increase of the relative weight of static power in the total power budget of circuits, will only improve the viabil… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

  6. arXiv:2305.19586  [pdf, other

    cs.CR cs.NE cs.PL cs.SE

    CryptOpt: Automatic Optimization of Straightline Code

    Authors: Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom

    Abstract: Manual engineering of high-performance implementations typically consumes many resources and requires in-depth knowledge of the hardware. Compilers try to address these problems; however, they are limited by design in what they can do. To address this, we present CryptOpt, an automatic optimizer for long stretches of straightline code. Experimental results across eight hardware platforms show that… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

  7. arXiv:2305.12784  [pdf, other

    cs.CR

    Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs

    Authors: Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom

    Abstract: The drive to create thinner, lighter, and more energy efficient devices has resulted in modern SoCs being forced to balance a delicate tradeoff between power consumption, heat dissipation, and execution speed (i.e., frequency). While beneficial, these DVFS mechanisms have also resulted in software-visible hybrid side-channels, which use software to probe analog properties of computing devices. Suc… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  8. arXiv:2211.10665  [pdf, other

    cs.CR cs.NE cs.PL

    CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives (full version)

    Authors: Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom

    Abstract: Most software domains rely on compilers to translate high-level code to multiple different machine languages, with performance not too much worse than what developers would have the patience to write directly in assembly language. However, cryptography has been an exception, where many performance-critical routines have been written directly in assembly (sometimes through metaprogramming layers).… ▽ More

    Submitted 21 May, 2023; v1 submitted 19 November, 2022; originally announced November 2022.

  9. arXiv:2211.01109  [pdf, other

    cs.CR

    The Impostor Among US(B): Off-Path Injection Attacks on USB Communications

    Authors: Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom

    Abstract: USB is the most prevalent peripheral interface in modern computer systems and its inherent insecurities make it an appealing attack vector. A well-known limitation of USB is that traffic is not encrypted. This allows on-path adversaries to trivially perform man-in-the-middle attacks. Off-path attacks that compromise the confidentiality of communications have also been shown to be possible. However… ▽ More

    Submitted 2 November, 2022; v1 submitted 2 November, 2022; originally announced November 2022.

    Comments: To appear in USENIX Security 2023

  10. arXiv:2201.11377  [pdf, other

    cs.CR

    CacheFX: A Framework for Evaluating Cache Security

    Authors: Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom

    Abstract: Over the last two decades, the danger of sharing resources between programs has been repeatedly highlighted. Multiple side-channel attacks, which seek to exploit shared components for leaking information, have been devised, mostly targeting shared caching components. In response, the research community has proposed multiple cache designs that aim at curbing the source of side channels. With multip… ▽ More

    Submitted 27 January, 2022; originally announced January 2022.

  11. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Authors: Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom

    Abstract: Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification to improve security. In this paper, we report on a new technique that can significantly extend the tracking time of fingerprint-based tracking methods… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States

  12. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code

    Authors: Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom

    Abstract: Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist, these often fail in practice due to unintended interactions between values deep within the CPU. To detect and protect from side-channel attacks, seve… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

  13. arXiv:2104.08593  [pdf, other

    cs.CR

    SoK: Design Tools for Side-Channel-Aware Implementations

    Authors: Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont

    Abstract: Side-channel attacks that leak sensitive information through a computing device's interaction with its physical environment have proven to be a severe threat to devices' security, particularly when adversaries have unfettered physical access to the device. Traditional approaches for leakage detection measure the physical properties of the device. Hence, they cannot be used during the design proces… ▽ More

    Submitted 14 June, 2021; v1 submitted 17 April, 2021; originally announced April 2021.

  14. arXiv:2103.04952  [pdf, other

    cs.CR

    Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses

    Authors: Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom

    Abstract: The "eternal war in cache" has reached browsers, with multiple cache-based side-channel attacks and countermeasures being suggested. A common approach for countermeasures is to disable or restrict JavaScript features deemed essential for carrying out attacks. To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying ou… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  15. arXiv:2007.08707  [pdf, other

    cs.CR cs.AR

    PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses

    Authors: Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom

    Abstract: Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to memory can induce bit flips in neighboring memory locations. Being a hardware vulnerability, rowhammer bypasses all of the system memory protection, allowing adversaries to compromise the integrity and confidentiality of data. Rowhammer attacks have shown to enable privilege escalation, sandbox escape, and cryptographic… ▽ More

    Submitted 23 July, 2020; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: Preprint of the work accepted at the International Symposium on Microarchitecture (MICRO) 2020. arXiv admin note: text overlap with arXiv:1912.03076

  16. arXiv:2006.13353  [pdf, other

    cs.CR

    CacheOut: Leaking Data on Intel CPUs via Cache Evictions

    Authors: Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom

    Abstract: Recent transient-execution attacks, such as RIDL, Fallout, and ZombieLoad, demonstrated that attackers can leak information while it transits through microarchitectural buffers. Named Microarchitectural Data Sampling (MDS) by Intel, these attacks are likened to "drinking from the firehose", as the attacker has little control over what data is observed and from what origin. Unable to prevent the bu… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

  17. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

    Authors: Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom

    Abstract: Since their introduction over two decades ago, side-channel attacks have presented a serious security threat. While many ciphers' implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present Rosita, a code rewrite engine that uses a leakage emulator which we amend to correctly emulate the mi… ▽ More

    Submitted 19 November, 2020; v1 submitted 11 December, 2019; originally announced December 2019.

    Comments: 17 pages, 16 figures. Accepted in Network and Distributed Systems Security (NDSS) Symposium 2021

  18. arXiv:1905.12701  [pdf, other

    cs.CR cs.AR

    Fallout: Reading Kernel Writes From User Space

    Authors: Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom

    Abstract: Recently, out-of-order execution, an important performance optimization in modern high-end processors, has been revealed to pose a significant security threat, allowing information leaks across security domains. In particular, the Meltdown attack leaks information from the operating system kernel to user space, completely eroding the security of the system. To address this and similar attacks, wit… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

  19. arXiv:1811.07153  [pdf, other

    cs.CR cs.LG

    Robust Website Fingerprinting Through the Cache Occupancy Channel

    Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom

    Abstract: Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the Tor… ▽ More

    Submitted 21 February, 2019; v1 submitted 17 November, 2018; originally announced November 2018.

  20. arXiv:1810.05345  [pdf, other

    cs.OS

    Time Protection: the Missing OS Abstraction

    Authors: Qian Ge, Yuval Yarom, Tom Chothia, Gernot Heiser

    Abstract: Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection in addition to the established memory… ▽ More

    Submitted 15 October, 2018; v1 submitted 11 October, 2018; originally announced October 2018.

  21. arXiv:1801.01207  [pdf, other

    cs.CR

    Meltdown

    Authors: Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

    Abstract: The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order execution on modern processors to read arbitrary kernel-memory locations including personal data and passwords. Out-of-order execution is an indispen… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

  22. arXiv:1801.01203  [pdf, ps, other

    cs.CR

    Spectre Attacks: Exploiting Speculative Execution

    Authors: Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom

    Abstract: Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to execute ahead. When the memory value finally arrives, the CPU either discards or commits the speculative computation. Speculative logic is unfaithful… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

  23. arXiv:1710.00551  [pdf, other

    cs.CR

    Another Flip in the Wall of Rowhammer Defenses

    Authors: Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom

    Abstract: The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated Rowhammer countermeasures have been presented, aiming at mitigating the Rowhammer bug or its exploitation. However, the state of the art provides insufficient insight on the completeness of these defenses. In this paper, we present novel… ▽ More

    Submitted 31 January, 2018; v1 submitted 2 October, 2017; originally announced October 2017.

    Comments: Preprint of the work accepted at the 39th IEEE Symposium on Security and Privacy 2018

  24. arXiv:1612.04474  [pdf, other

    cs.CR

    Your Processor Leaks Information - and There's Nothing You Can Do About It

    Authors: Qian Ge, Yuval Yarom, Frank Li, Gernot Heiser

    Abstract: Timing channels are information flows, encoded in the relative timing of events, that bypass the system's protection mechanisms. Any microarchitectural state that depends on execution history and affects the rate of progress of later executions potentially establishes a timing channel, unless explicit steps are taken to close it. Such state includes CPU caches, TLBs, branch predictors and prefetch… ▽ More

    Submitted 14 September, 2017; v1 submitted 13 December, 2016; originally announced December 2016.