CWE一覧に戻る
CWE-1255

比較ロジックは電源サイドチャネル攻撃に弱い

Comparison Logic is Vulnerable to Power Side-Channel Attacks
脆弱性 レビュー中
JA

セキュリティ・トークンの評価中に、デバイスのリアルタイムの消費電力を監視し、得られた情報を使用して参照トークンの値を決定することができる。

デバイスによって消費される電力は、計測され、リアルタイムで監視される可能性がある。セキュリ ティトークンを評価するアルゴリズムが十分に堅牢でない場合、消費電力は、基準値に対するトークンエント リ比較によって変化する可能性がある。さらに、再試行が無制限である場合、「良い」エントリと「悪い」エントリの間の電力差が観察され、各エントリ自 体が正しいかどうかを判断するために使用され、それによって不正な関係者が基準値を計算することができる。

EN

A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.

The power consumed by a device may be instrumented and monitored in real time. If the algorithm for evaluating security tokens is not sufficiently robust, the power consumption may vary by token entry comparison against the reference value. Further, if retries are unlimited, the power difference between a "good" entry and a "bad" entry may be observed and used to determine whether each entry itself is correct thereby allowing unauthorized parties to calculate the reference value.

Scope: Confidentiality, Integrity, Availability, Access Control, Accountability, Authentication, Authorization, Non-Repudiation / Impact: Modify Memory; Read Memory; Read Files or Directories; Modify Files or Directories; Execute Unauthorized Code or Commands; Gain Privileges or Assume Identity; Bypass Protection Mechanism; Read Application Data; Modify Application Data; Hide Activities
The design phase must consider each check of a security token against a standard and the amount of power consumed during the check of a good token versus a bad token. The alternative is an all at once check where a retry counter is incremented PRIOR to the check.
Another potential mitigation is to parallelize shifting of secret data (see example 2 below). Note that the wider the bus the more effective the result.
An additional potential mitigation is to add random data to each crypto operation then subtract it out afterwards. This is highly effective but costly in performance, area, and power consumption. It also requires a random number generator.
If the architecture is unable to prevent the attack, using filtering components may reduce the ability to implement an attack, however, consideration must be given to the physical removal of the filter elements.
During integration, avoid use of a single secret for an extended period (e.g. frequent key updates). This limits the amount of data compromised but at the cost of complexity of use.
MITRE公式ページ — CWE-1255