L EAKAGE and T AMPER Resilient R andom A ccess M achine ( LTRAM )

10
LEAKAGE and TAMPER Resilient Random Access Machine (LTRAM) Pratyay Mukherjee Aarhus University Joint work with Sebastian Faust, Jesper Buus Nielsen and Daniele Venturi

description

L EAKAGE and T AMPER Resilient R andom A ccess M achine ( LTRAM ). Pratyay Mukherjee Aarhus University Joint work with Sebastian Faust, Jesper Buus Nielsen and Daniele Venturi. Provable security breaks down!. Because…. The Model. Reality. Provable security breaks down!. - PowerPoint PPT Presentation

Transcript of L EAKAGE and T AMPER Resilient R andom A ccess M achine ( LTRAM )

Page 1: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

LEAKAGE and TAMPER Resilient Random Access Machine (LTRAM)

Pratyay MukherjeeAarhus University

Joint work with

Sebastian Faust, Jesper Buus Nielsen and Daniele Venturi

Page 2: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Provable security breaks down! Because….

The Model Reality

Page 3: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Provable security breaks down! Because….

The Model Reality

More seriousl

y !Side channel attacks: Leakage/ Tampering

Blakcbox

Our main

focus

Page 4: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Models of Tampering

Tamper “only memory”Tamper “whole computation”

Page 5: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Models of Tampering

Tamper “only memory”Tamper “whole computation”In the beginning….

We are STRONGERrrr !!!

Page 6: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Models of Tampering

Tamper “only memory”Tamper “whole computation”

Existing results suffer from limitation e.g. can tamper

upto 1/poly(n)

A number of strong positive results e.g. split-state

tampering

…..after a few years….

[IPSW 06, ….., DK 14] [GLMMR 04, ……………………………..,DPW 10,…..]

I have better RESULTS !!!

Page 7: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Our approachCan we protect against more Tampering with computation if we consider RAM ?

Instead of

Protect me !

Page 8: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Our Result: RAM + NMC => TRAM

TRAM

TCC 2014

Idea: Encode locations with NMC.

Note: The computation is stored as a program.

Page 9: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

In fact we can get LTRAM

LTRAM

Caveat: We assume tamper-proof CPU.

But, the CPU is small and universal i.e.independent of the functionality.

Page 10: L EAKAGE and  T AMPER  Resilient R andom A ccess  M achine ( LTRAM )

Our LTRAM

CPU

Secret Disk-1

Secret Disk-2

Public disk