Using Chip Malfunction To Leak Private Keys

  /     /     /  
Publicated : 22/11/2024   Category : security


Using Chip Malfunction To Leak Private Keys


Black Hat researcher shows attackers could manipulate Linux machines running Open SSL and RSA encryption to gain access to authentication encryption keys for spoofing



Many financial institutions and other security-conscious organizations rely on the RSA Algorithm in encrypted authentication applications to not only authenticate users are who they say they are, but also the other way around -- to assure users they are interacting with their vendors website rather than a spoof. Fundamental to this encrypted method of assurance is that the RSA private key held by the secured organization always remain a secret. This week at Black Hat, a researcher from University of Michigan will show how small electrical malfunctions in server processor chips can make it possible for attackers to quietly glean the contents of an entire private key.
We basically made the hardware temporarily fail and through that the system gives incorrect signed messages from which we can then extract a private key, says Valeria Bertacco, associate professor of electrical engineering and computer science at University of Michigan, summing up the work shes presenting on at Black Hat.
Bertacco says she and her team built on theoretical work done by researchers in Frankfurt who found that if a server encrypting the message with a private key executed a certain mistake, it would send to the client an incorrectly encrypted message that the client could use to extract a few bits of the private key.
At the time, those researchers believed such a small mistake and small leak would prove difficult to reproduce. But Bertacco and her team were able to reproduce those errors on Linux servers they built running an Open SSL library and RSA encryption.
The way we do that is making the transistors in the machine that runs the server fail every now and then, she says, explaining that they did this through two different methods, by tinkering with the voltage fed to the chip and also by increasing the temperature at the chip socket.
The technique we used the first time around was by lowering the power voltage on the system, so instead of operating at the correct voltage, it was operating a little bit of a lower voltage to get some mistakes sometimes, she says.
Not all the errors that the server produced were the errors the team was looking for. In fact, it had to collect 8,000 erroneous messages to get about 800 of the type they wanted.
But those 800 were good enough to get us the entire 1024-bit private key, she says.
Many would argue that such a method poses a low risk to secured organizations because attackers wouldnt have control over a servers voltage. But Bertacco says the research has applicability on embedded devices that depend on encrypted authentication protocols.
People who attack systems using this type of technique can definitely start attacking common machines that use embedded systems that use Linux and use authentication: DVD players, Playstations, even automobiles, she says.
Additionally, the second vulnerability that would create the right kind of errors could be exploited remotely. She reports that an overheated processor within a very specific temperature range created the same effect as lowering the voltage. This is a dangerous condition considering the number of overheated servers present in data centers around the world.
Thats one of the main problems in data centers. Theyre often overheated, she says. I might not know which servers, but if Im careful enough to look around Ill find some. So thats actually a situation where I can exploit a remote server for this type of attack.
When it comes to protecting against these types of attack, the theory is simple, she says. The server should conduct integrity checking of the message it sends to make sure that it isnt erroneous or at least be using some sort of blinding technique to protect from such a data leak.
Its not that complicated but doing these things would require more computing resources and sometimes people are pretty sensitive to the response time of the server, she says.
At the moment, OpenSSL has no specific patch against her attack, Bertacco says, but if a user encrypts using its top-level function, RSA_private_decrypt, and the library is compiled with blinding enabled then they would be protected from this kind of attack as well as timing-based attacks. However, if blinding is disabled, or if a user called directly the exponentiation function--RSA_eay_mod_exp--then the library provides no protection against the attack, even in its most recent version, she says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Using Chip Malfunction To Leak Private Keys