MARC보기
LDR03647nmm uu200421 4500
001000000332053
00520240805165926
008190108s2018 |||||||||||||||||c||eng d
020 ▼a 9780438169135
035 ▼a (MiAaPQ)AAI10825332
035 ▼a (MiAaPQ)ucsd:17524
040 ▼a MiAaPQ ▼c MiAaPQ ▼d 248032
0820 ▼a 004
1001 ▼a Kohlbrenner, David William.
24510 ▼a Trusted Systems for Uncertain Times.
260 ▼a [S.l.] : ▼b University of California, San Diego., ▼c 2018
260 1 ▼a Ann Arbor : ▼b ProQuest Dissertations & Theses, ▼c 2018
300 ▼a 135 p.
500 ▼a Source: Dissertation Abstracts International, Volume: 79-12(E), Section: B.
500 ▼a Adviser: Hovav Shacham.
5021 ▼a Thesis (Ph.D.)--University of California, San Diego, 2018.
520 ▼a When software is designed, even with security in mind, assumptions are made about the details of hardware behavior. Unfortunately, the correctness of such assumptions can be critical to the desired security properties. In this dissertation we first demonstrate how incorrect assumptions about the hardware abstraction lead to side-channels that threaten modern software security, and second we propose a principled method of timing channel defense for modern web browsers.
520 ▼a We show how performance variations in floating-point math instructions enable the first demonstrated instruction-data timing side-channel on commodity hardware. We use this side-channel in two case studies to prove it's viability. First, we redesign a previous attack on an xivolder version of the Firefox web browser to violate the Same Origin Policy. Second, we break the guarantees of a differentially private database designed to resist timing attacks. We show how the timing side-channel arises from hardware optimization decisions that have been well understood in the architecture, numerical analysis, and game-engine communities, but largely ignored in security.
520 ▼a Using a detailed measurement and analysis of floating-point performance, we examine the progress and potential of defenses against floating-point timing side-channels. We find that all deployed defensive schemes for desktop web browsers were insufficient, and most are still vulnerable. Using the same analysis methods, we show how a proposed defensive scheme makes incorrect assumptions about the hardware features it leverages, negating its guarantees.
520 ▼a As a possible remediation to the problem of floating-point timing side-channels, we present libfixedtimefixedpoint as an alternative to floating-point. It provides a fixed- point implementation of most available floating-point operations and is designed to run in constant time regardless of the input values.
520 ▼a Finally, we discuss structural problems in modern web browser design that make them amenable to all timing attacks. Adapting solutions from parallel problems solved by early trusted operating systems projects, we propose a modified browser architecture providing a provable defensive guarantee against all timing attacks. We then demonstrate the viability of this scheme by prototyping aspects of the architecture in a modified web browser.
590 ▼a School code: 0033.
650 4 ▼a Computer science.
690 ▼a 0984
71020 ▼a University of California, San Diego. ▼b Computer Science.
7730 ▼t Dissertation Abstracts International ▼g 79-12B(E).
773 ▼t Dissertation Abstract International
790 ▼a 0033
791 ▼a Ph.D.
792 ▼a 2018
793 ▼a English
85640 ▼u http://www.riss.kr/pdu/ddodLink.do?id=T15013675 ▼n KERIS
980 ▼a 201812 ▼f 2019
990 ▼a 관리자