Close Menu
    Facebook X (Twitter) Instagram
    SciTechDaily
    • Biology
    • Chemistry
    • Earth
    • Health
    • Physics
    • Science
    • Space
    • Technology
    Facebook X (Twitter) Pinterest YouTube RSS
    SciTechDaily
    Home»Technology»MIT’s Cybersecurity Metior: A Secret Weapon Against Side-Channel Attacks
    Technology

    MIT’s Cybersecurity Metior: A Secret Weapon Against Side-Channel Attacks

    By Adam Zewe, Massachusetts Institute of TechnologyJuly 12, 2023No Comments6 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email Reddit
    Cybersecurity Technology Concept
    MIT researchers have developed Metior, a framework that can quantitatively evaluate the effectiveness of obfuscation schemes used to protect against side-channel attacks. By transforming the flow of information into mathematical variables, Metior enables engineers to better understand how security measures perform, thereby aiding in the selection of effective strategies during the chip design process.

    MIT’s new system analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information.

    Researchers have created a system to examine how a hacker can circumvent a particular type of cybersecurity method, in an effort to determine how much secret information that attacker could steal from a computer program.

    A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory.

    Security approaches that completely block these “side-channel attacks” are so computationally expensive that they aren’t feasible for many real-world systems. Instead, engineers often apply what are known as obfuscation schemes that seek to limit, but not eliminate, an attacker’s ability to learn secret information.

    To help engineers and scientists better understand the effectiveness of different obfuscation schemes, MIT researchers created a framework to quantitatively evaluate how much information an attacker could learn from a victim program with an obfuscation scheme in place.

    Their framework, called Metior, allows the user to study how different victim programs, attacker strategies, and obfuscation scheme configurations affect the amount of sensitive information that is leaked. The framework could be used by engineers who develop microprocessors to evaluate the effectiveness of multiple security schemes and determine which architecture is most promising early in the chip design process.

    “Metior helps us recognize that we shouldn’t look at these security schemes in isolation. It is very tempting to analyze the effectiveness of an obfuscation scheme for one particular victim, but this doesn’t help us understand why these attacks work. Looking at things from a higher level gives us a more holistic picture of what is actually going on,” says Peter Deutsch, a graduate student and lead author of an open-access paper on Metior.

    Deutsch’s co-authors include Weon Taek Na, an MIT graduate student in electrical engineering and computer science; Thomas Bourgeat PhD ’23, an assistant professor at the Swiss Federal Institute of Technology (EPFL); Joel Emer, an MIT professor of the practice in computer science and electrical engineering; and senior author Mengjia Yan, the Homer A. Burnell Career Development Assistant Professor of Electrical Engineering and Computer Science (EECS) at MIT and a member of the Computer Science and Artificial Intelligence Laboratory (CSAIL). The research was presented last week at the International Symposium on Computer Architecture.

    Illuminating Obfuscation

    While there are many obfuscation schemes, popular approaches typically work by adding some randomization to the victim’s behavior to make it harder for an attacker to learn secrets. For instance, perhaps an obfuscation scheme involves a program accessing additional areas of the computer memory, rather than only the area it needs to access, to confuse an attacker. Others adjust how often a victim accesses memory or another a shared resource so an attacker has trouble seeing clear patterns.

    But while these approaches make it harder for an attacker to succeed, some amount of information from the victim still “leaks” out. Yan and her team want to know how much.

    They had previously developed CaSA, a tool to quantify the amount of information leaked by one particular type of obfuscation scheme. But with Metior, they had more ambitious goals. The team wanted to derive a unified model that could be used to analyze any obfuscation scheme — even schemes that haven’t been developed yet.

    To achieve that goal, they designed Metior to map the flow of information through an obfuscation scheme into random variables. For instance, the model maps the way a victim and an attacker access shared structures on a computer chip, like memory, into a mathematical formulation.

    One Metior derives that mathematical representation, the framework uses techniques from information theory to understand how the attacker can learn information from the victim. With those pieces in place, Metior can quantify how likely it is for an attacker to successfully guess the victim’s secret information.

    “We take all of the nitty-gritty elements of this microarchitectural side-channel and map it down to, essentially, a math problem. Once we do that, we can explore a lot of different strategies and better understand how making small tweaks can help you defend against information leaks,” Deutsch says.

    Surprising Insights

    They applied Metior in three case studies to compare attack strategies and analyze the information leakage from state-of-the-art obfuscation schemes. Through their evaluations, they saw how Metior can identify interesting behaviors that weren’t fully understood before.

    For instance, a prior analysis determined that a certain type of side-channel attack, called probabilistic prime and probe, was successful because this sophisticated attack includes a preliminary step where it profiles a victim system to understand its defenses.

    Using Metior, they show that this advanced attack actually works no better than a simple, generic attack and that it exploits different victim behaviors than researchers previously thought.

    Moving forward, the researchers want to continue enhancing Metior so the framework can analyze even very complicated obfuscation schemes in a more efficient manner. They also want to study additional obfuscation schemes and types of victim programs, as well as conduct more detailed analyses of the most popular defenses.

    Ultimately, the researchers hope this work inspires others to study microarchitectural security evaluation methodologies that can be applied early in the chip design process.

    “Any kind of microprocessor development is extraordinarily expensive and complicated, and design resources are extremely scarce. Having a way to evaluate the value of a security feature is extremely important before a company commits to microprocessor development. This is what Metior allows them to do in a very general way,” Emer says.

    Reference: Metior: A Comprehensive Model to Evaluate Obfuscating Side-Channel Defense Schemes

    This research is funded, in part, by the National Science Foundation, the Air Force Office of Scientific Research, Intel, and the MIT RSC Research Fund.

    Never miss a breakthrough: Join the SciTechDaily newsletter.
    Follow us on Google and Google News.

    Computer Science CSAIL Cybersecurity Electrical Engineering MIT Popular
    Share. Facebook Twitter Pinterest LinkedIn Email Reddit

    Related Articles

    A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information

    MIT Develops New Programming Language for High-Performance Computers

    Breakthrough AI Technique Enables Real-Time Rendering of Scenes in 3D From 2D Images

    New Artificial Intelligence System Enables Machines That See the World More Like Humans Do

    Unlocking the Potential of Blockchain Technology: Decentralized, Secure, and Scalable

    Researchers Develop Speedier Network Analysis to Boost Recommendation Algorithms and Internet Search

    How Quantum Computers Could Usher In a Golden Age of Computing Power

    MIT CSAIL: If Transistors Can’t Get Smaller, Then Coders Have to Get Smarter

    Carbon Nanotube Transistor Advance Paves the Way for 3D Microprocessors

    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Pinterest
    • YouTube

    Don't Miss a Discovery

    Subscribe for the Latest in Science & Tech!

    Trending News

    Scientists Uncover Potential Brain Risks of Popular Fish Oil Supplements

    Scientists Discover a Surprising Way To Make Bread Healthier and More Nutritious

    After 60 Years, Scientists Uncover Unexpected Brain Effects of Popular Diabetes Drug Metformin

    New Research Uncovers Hidden Side Effects of Popular Weight-Loss Drugs

    Scientists Rethink Extreme Warming After Surprising Ocean Discovery

    Landmark Study Links Never Marrying to Significantly Higher Cancer Risk

    Researchers Discover Unknown Beetle Species Just Steps From Their Lab

    Largest-Ever Study Finds Medicinal Cannabis Ineffective for Anxiety, Depression, PTSD

    Follow SciTechDaily
    • Facebook
    • Twitter
    • YouTube
    • Pinterest
    • Newsletter
    • RSS
    SciTech News
    • Biology News
    • Chemistry News
    • Earth News
    • Health News
    • Physics News
    • Science News
    • Space News
    • Technology News
    Recent Posts
    • Early Warning Signals of Esophageal Cancer May Be Hiding in Plain Sight
    • Researchers Have Discovered a THC-Free Cannabis Compound That May Replace Opioids
    • Common Blood Pressure Drug Shows Surprising Power Against Deadly Antibiotic-Resistant Superbug
    • Students Build Dark Matter Detector and Set New Experimental Limits
    • Scientists Discover Caffeine Can Repair Key Memory Circuits After Sleep Loss
    Copyright © 1998 - 2026 SciTechDaily. All Rights Reserved.
    • Science News
    • About
    • Contact
    • Editorial Board
    • Privacy Policy
    • Terms of Use

    Type above and press Enter to search. Press Esc to cancel.