Déjà Vu: Side-Channel Analysis of Mozilla's NSS

08/13/2020
by   Sohaib ul Hassan, et al.
0

Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not done directly to them. In this work, we present another instance of this issue by performing the first library-wide SCA security evaluation of Mozilla's NSS security library. We use a combination of two independently-developed SCA security frameworks to identify and test security vulnerabilities. Our evaluation uncovers several new vulnerabilities in NSS affecting DSA, ECDSA, and RSA cryptosystems. We exploit said vulnerabilities and implement key recovery attacks using signals—extracted through different techniques such as timing, microarchitecture, and EM—and improved lattice methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/23/2023

Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels

Timing attacks are considered one of the most damaging side-channel atta...
research
09/04/2019

Certified Side Channels

We demonstrate that the format in which private keys are persisted impac...
research
07/16/2020

Deep ahead-of-threat virtual patching

Many applications have security vulnerabilities that can be exploited. I...
research
03/16/2020

Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities

Vyper has been proposed as a new high-level language for Ethereum smart ...
research
03/04/2020

Revisiting Security Vulnerabilities in Commercial Password Managers

In this work we analyse five popular commercial password managers for se...
research
03/31/2018

A Survey of Techniques for Improving Security of GPUs

Graphics processing unit (GPU), although a powerful performance-booster,...
research
07/05/2020

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Memory corruption vulnerabilities have been around for decades and rank ...

Please sign up or login with your details

Forgot password? Click here to reset