How Secure Is Green It? The Case Of Software-Based Energy Side Channels

COMPUTER SECURITY (ESORICS 2018), PT I(2018)

引用 19|浏览43
暂无评分
摘要
Software-based energy measurement features in contemporary CPUs allow one to track and to limit energy consumption, e.g., for realizing green IT. The security implications of software-based energy measurement, however, are not well understood. In this article, we study such security implications of green IT. More concretely, we show that side-channel attacks can be established using software-based energy measurement at the example of a popular RSA implementation. Using distinguishing experiments, we identify a side-channel vulnerability that enables attackers to distinguish RSA keys by measuring energy consumption. We demonstrate that a surprisingly low number of sample measurements suffices to succeed in an attack with high probability. In contrast to traditional power side-channel attacks, no physical access to hardware is needed. This makes the vulnerabilities particularly serious.
更多
查看译文
关键词
Software-based Energy, Side Channel, Distinguishing Experiments, Victim Program, Mean Energy Expenditure
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要