Side Channels Flashcards

1
Q

What is a side-channel attack?

A

An attack based on information from the physical implementation of a system, rather than its theoretical properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are side-channel attacks significant in cryptosystems?

A

Cryptosystems often leak information through timing, power consumption, or electromagnetic emissions, revealing secret data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are timing attacks?

A

Exploiting variations in operation times to infer sensitive information, such as cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is power analysis in side-channel attacks?

A

Observing power consumption patterns to deduce information about computations or secret keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is differential power analysis?

A

Using statistical analysis of power consumption traces to extract cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do cache timing attacks work?

A

Manipulating cache states and observing timing differences to infer victim activity and data access patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What vulnerability does Spectre exploit?

A

Speculative execution and cache timing to access private information within the same process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the “Flush + Reload” technique work?

A

Fluch cache lines, wait for victim activity, then reload and time accesses to see which lines the victim accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the steps in a Spectre attack?

A
  1. Train branch predictor.
  2. Exploit mis-speculation to access restricted memory.
  3. Analyze cache impacts to extract secrets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are laser-based audio injection attacks?

A

Using lasers to simulate audio signals in voice-controlled systems to manipulate them remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can motion sensors be exploited?

A

Inferring speech or keystrokes from subtle vibrations detected by accelerometers and gyroscopes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can keyboards be compromised?

A

Monitoring electromagnetic emissions or acoustics to infer typed characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can reflections compromise privacy?

A

Analyzing reflections from screens or surfaces to recover displayed or typed information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can sound be extracted from videos?

A

Using high-frame-rate video analysis to infer sound vibrations (e.g., SIGGRAPH “Visual Microphone”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is website fingerprinting?

A

Identifying accessed webpages based on traffic patterns or power consumption profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does powerline eavesdropping work?

A

Observing electromagnetic interference from devices via powerlines to infer activity or data.

17
Q

How can side channels be used positively?

A

For anomaly detection in constrained environments like medical devices.

18
Q

What are the key requirements for effective side-channel detection systems?

A

No software changes, no updates, no manual configuration, and no network connection.

19
Q

What assumptions are made about the adversary in Spectre attacks?

A

Can run code in the same process.
Controls inputs to specific memory areas.
Cannot directly access restricted memory.

20
Q

What is speculative execution?

A

Predicting and executing instructions ahead of actual decisions to improve speed, later rolling back if predictions are incorrect.