l eakage and t amper resilient r andom a ccess m achine ( ltram )

Post on 11-Jan-2016

38 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

L EAKAGE and T AMPER Resilient R andom A ccess M achine ( LTRAM ). Pratyay Mukherjee Aarhus University Joint work with Sebastian Faust, Jesper Buus Nielsen and Daniele Venturi. Provable security breaks down!. Because…. The Model. Reality. Provable security breaks down!. - PowerPoint PPT Presentation

TRANSCRIPT

LEAKAGE and TAMPER Resilient Random Access Machine (LTRAM)

Pratyay MukherjeeAarhus University

Joint work with

Sebastian Faust, Jesper Buus Nielsen and Daniele Venturi

Provable security breaks down! Because….

The Model Reality

Provable security breaks down! Because….

The Model Reality

More seriousl

y !Side channel attacks: Leakage/ Tampering

Blakcbox

Our main

focus

Models of Tampering

Tamper “only memory”Tamper “whole computation”

Models of Tampering

Tamper “only memory”Tamper “whole computation”In the beginning….

We are STRONGERrrr !!!

Models of Tampering

Tamper “only memory”Tamper “whole computation”

Existing results suffer from limitation e.g. can tamper

upto 1/poly(n)

A number of strong positive results e.g. split-state

tampering

…..after a few years….

[IPSW 06, ….., DK 14] [GLMMR 04, ……………………………..,DPW 10,…..]

I have better RESULTS !!!

Our approachCan we protect against more Tampering with computation if we consider RAM ?

Instead of

Protect me !

Our Result: RAM + NMC => TRAM

TRAM

TCC 2014

Idea: Encode locations with NMC.

Note: The computation is stored as a program.

In fact we can get LTRAM

LTRAM

Caveat: We assume tamper-proof CPU.

But, the CPU is small and universal i.e.independent of the functionality.

Our LTRAM

CPU

Secret Disk-1

Secret Disk-2

Public disk

top related