Thread #PLATYPUS

PLATYPUS is a novel side-channel attack targeting Intel x86 CPU (including AES-NI, SGX).
> platypusattack.com

I'm not surprised that we discover new attacks on Intel CPU, while I'm very surprised this attack has just been discovered now.

(1/n)
PLATYPUS is a Side Channel Attack allowing to _remotely_ extract secrets from Intel CPU incl. SGX enclave and AES-NI.
It uses the unprivileged access to RAPL (Running Average Power Limit) interface to get an internal measurement of the power consumption of the chip.

(2/n)
From an attacker PoV, this interface is great since it's unpriviledged and can be accessed remotely.

On the other side, it's quite low resolution, you can only get samples at 20kHz. This later limitation is overcome by several of techniques (cf paper).

(3/n)
Having a digital oscilloscope inside a CPU is a dream for any Side Channel Attacker.
Within this threat model, for sure, it becomes possible to spy everything on what's going on inside the CPU, including the use of cryptographic materials whether they are in SGX or not...

(4/n)
I'm pretty surprised this attack has just been discovered now!
Power-based Side Channel Attacks have been published more that 20 years ago, and were probably exploited before

In this context, the attacker has a physical access to the chip and measures its power consumption
(5/n)
These attacks are very efficient and drove a whole industry willing to secure its circuits against an attacker with a physical access (Secure Element/Smartcard)

A lot of research has been done enhancing attacks and countermeasures on these chips (cf. CPA, DPA, Template..)

(6/n)
Today, a circuit without such countermeasures is clearly vulnerable to these attacks. Any attacker with a physical access can extract secrets from them.

(7/n)
On Intel CPU, these attacks weren't much studied:
- An attacker with a physical access to a CPU is a bit less realistic
- It's not convenient to set-up a testbench measuring power consumption on a 3GHz CPU having multiple cores

(8/n)
On ARM-based SoC, both Side Channel have been studied:
- measuring power consumption/EM on the chip
- use software to get the power trace. It has been done directly from the OS (Android for instance), or from the SoC ADC - (eg. @colinoflynn excellent work)

(9/n)
All the pieces were on the table, but no one could see it before now (at least publicly, this could have been exploited already).

So, congratz again to the @tugraz team (@mlqxyz
et al.) for putting them together!

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Charles Guillemet

Charles Guillemet Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @P3b7_

29 May
I've read several misconceptions about Common Criteria certifications. Typically:
- "Components producers pay for certification"
- "Certifications test only against a known set of predefined scenarios"
- "Certifications are not a replacement for independant review"

Thread👇
(2/n)
In a Common Criteria Certification process (for a circuit). There are 4 actors:
1. The sponsor (SP)
2. The chip manufacturer (CM)
3. The 3rd party evaluation lab (lab)
4. The Certification body (CB)
(3/n)
Often SP and CM is the same entity, but not always.

The lab is an independant security eval entity accredited by the CB. There's no commercial relationship between lab and the CB. Regularly, the CB audits the lab to verify its skills.

Labs can lose their accreditation.
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!