Threat Model: clarify stance on timing attacks
Signed-off-by: Janos Follath <janos.follath@arm.com>
This commit is contained in:
parent
c51a413c47
commit
4317a9ef1f
1 changed files with 9 additions and 4 deletions
13
SECURITY.md
13
SECURITY.md
|
@ -48,15 +48,20 @@ files.
|
||||||
|
|
||||||
#### Timing attacks
|
#### Timing attacks
|
||||||
|
|
||||||
The attacker is able to observe the timing of instructions executed by Mbed
|
The attacker is able to observe the timing of instructions executed by Mbed TLS
|
||||||
TLS.(See for example the [Flush+Reload
|
by leveraging shared hardware that both Mbed TLS and the attacker have access
|
||||||
paper](https://eprint.iacr.org/2013/448.pdf).)
|
to. Typical attack vectors include cache timings, memory bus contention and
|
||||||
|
branch prediction.
|
||||||
|
|
||||||
Mbed TLS provides limited protection against timing attacks. The cost of
|
Mbed TLS provides limited protection against timing attacks. The cost of
|
||||||
protecting against timing attacks widely varies depending on the granularity of
|
protecting against timing attacks widely varies depending on the granularity of
|
||||||
the measurements and the noise present. Therefore the protection in Mbed TLS is
|
the measurements and the noise present. Therefore the protection in Mbed TLS is
|
||||||
limited. We are only aiming to provide protection against **publicly
|
limited. We are only aiming to provide protection against **publicly
|
||||||
documented** attacks.
|
documented attack techniques**.
|
||||||
|
|
||||||
|
As attacks keep improving, so does Mbed TLS's protection. Mbed TLS is moving
|
||||||
|
towards a model of fully timing-invariant code, but has not reached this point
|
||||||
|
yet.
|
||||||
|
|
||||||
**Remark:** Timing information can be observed over the network or through
|
**Remark:** Timing information can be observed over the network or through
|
||||||
physical side channels as well. Remote and physical timing attacks are covered
|
physical side channels as well. Remote and physical timing attacks are covered
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue