Lec 7: Side Channels Flashcards
What is our typical threat model for security?
How is threat actually more complicated?
What is a side channel?
- when secrets leak outside the protocol because of how it’s implemented
What is a covert channel?
When an adversary tries to leak secrets by hidin them in normal communications
What are the two ways information is leaked?
What are some of the kinds of side channels?
How does a timing side channel work?
What are different real-world examples of timing side channels?
Explain the practical attack on OpenSSL (Brumley&Boneh 02)
What is the multiplication timing dependency?
What is the reduction timing dependency?
What is the Data Dependency Summary?
What were the results of an attack extract RSA private key?
How do hardware side channels work?
What is an example of a simple power analysis?