Side Channel Attack Flashcards
What is a side-channel attack?
A side-channel attack exploits unintentional physical information emitted by a system to gain internal information about the system.
What types of side-channels exist?
There are various types of side-channels such as time, power, electromagnetic radiation, temperature, light, and sound.
What is a timing attack?
A timing attack is a type of side-channel attack where the time taken by a system to perform certain operations is measured to extract secret information.
What is power analysis?
Power analysis is a type of side-channel attack that involves measuring the power consumption of a device to deduce the operations being performed or the data being processed.
What is a padding oracle attack?
A padding oracle attack is a type of side-channel attack that exploits the padding of a cryptographic message to decrypt the ciphertext.
What is Rowhammer?
Rowhammer is a hardware bug that allows attackers to manipulate data in memory without accessing it.
What are Spectre and Meltdown?
Spectre and Meltdown are hardware vulnerabilities in modern processors that allow programs to steal data which is currently processed on the computer.
What are some countermeasures against side-channel attacks?
Countermeasures include shielding, masking, hiding, time/execution randomization, and noise generation.
What is shielding in the context of side-channel attacks?
Shielding involves physically protecting a system to prevent it from emitting side-channel information.
What is masking in the context of side-channel attacks?
Masking involves obscuring sensitive information by combining it with random data.
What is hiding in the context of side-channel attacks?
Hiding involves making the operation time or power consumption independent of the processed data.
What is time/execution randomization in the context of side-channel attacks?
Time/execution randomization involves randomizing the time of operations or the order of execution to make it harder for an attacker to correlate observed side-channel information with specific operations.
What is noise generation in the context of side-channel attacks?
Noise generation involves adding random data or operations to the system to obscure the side-channel information.
How does a timing attack work?
A timing attack works by measuring the time a system takes to perform certain operations and correlating this with the processed data.
How does a power analysis attack work?
A power analysis attack works by measuring the power consumption of a device while it is performing certain operations and correlating this with the processed data.
How does a padding oracle attack work?
A padding oracle attack works by sending modified ciphertexts to the system and observing the resulting error messages or timings, which can reveal information about the correct plaintext or padding.
How does Rowhammer work?
Rowhammer works by repeatedly accessing certain rows of memory, which can cause bit flips in adjacent rows due to a hardware bug in DRAM.
How do Spectre and Meltdown work?
Spectre and Meltdown work by exploiting speculative execution and caching mechanisms in modern processors to read memory that should be inaccessible.
How does shielding protect against side-channel attacks?
Shielding protects against side-channel attacks by physically preventing a system from emitting side-channel information, for example by using a Faraday cage.
How does masking protect against side-channel attacks?
Masking protects against side-channel attacks by obscuring sensitive information with random data, making it harder for an attacker to extract the sensitive information from side-channel observations.
How does hiding protect against side-channel attacks?
Hiding protects against side-channel attacks by making the operation time or power consumption independent of the processed data, making it harder for an attacker to correlate observed side-channel information with specific operations.
How does time/execution randomization protect against side-channel attacks?
Time/execution randomization protects against side-channel attacks by randomizing the time of operations or the order of execution to make it harder for an attacker to correlate observed side-channel information with specific operations.
How does noise generation protect against side-channel attacks?
Noise generation protects against side-channel attacks by adding random data or operations to the system to obscure the side-channel information.
What is the goal of a side-channel attack?
The goal of a side-channel attack is to gain internal information about a system by exploiting unintentional physical information emitted by the system.