Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
162 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs (2407.16473v1)

Published 23 Jul 2024 in cs.CR

Abstract: Cryptocurrency introduces usability challenges by requiring users to manage signing keys. Popular signing key management services (e.g., custodial wallets), however, either introduce a trusted party or burden users with managing signing key shares, posing the same usability challenges. TEEs (Trusted Execution Environments) are a promising technology to avoid both, but practical implementations of TEEs suffer from various side-channel attacks that have proven hard to eliminate. This paper explores a new approach to side-channel mitigation through economic incentives for TEE-based cryptocurrency wallet solutions. By taking the cost and profit of side-channel attacks into consideration, we designed a Stick-and-Carrot-based cryptocurrency wallet, CrudiTEE, that leverages penalties (the stick) and rewards (the carrot) to disincentivize attackers from exfiltrating signing keys in the first place. We model the attacker's behavior using a Markov Decision Process (MDP) to evaluate the effectiveness of the bounty and enable the service provider to adjust the parameters of the bounty's reward function accordingly.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (74)
  1. Cache based remote timing attack on the AES. In Topics in Cryptology – CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007, pages 271–286, February 2007.
  2. Automatic certificate management environment (acme). https://datatracker.ietf.org/doc/html/rfc8555.
  3. AMD secure encrypted virtualization (SEV). https://www.amd.com/en/developer/sev.html.
  4. Innovative technology for CPU based attestation and sealing. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
  5. Ladderleak: Breaking ecdsa with less than one bit of nonce leakage. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS ’20, page 225–242, New York, NY, USA, 2020. Association for Computing Machinery. doi:10.1145/3372297.3417268.
  6. URL: https://docs.arbitrum.io/sequencer/#unhappyuncommon-case-sequencer-isnt-doing-its-job.
  7. AWS price calculator. https://calculator.aws/, 2023.
  8. The Sting framework (SF), 2023. URL: https://initc3org.medium.com/the-sting-framework-sf-ef00702c88c7.
  9. Bitcoin core 25.0. https://github.com/bitcoin/bitcoin, 2023.
  10. Dr. SGX: Automated and adjustable side-channel protection for SGX using data location randomization. In 35th Annual Computer Security Applications Conference, pages 788–800, 2019.
  11. Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts. In 27th USENIX Security Symposium, pages 1335–1352, 2018.
  12. Mitigating cache/timing attacks in AES and RSA software implementations. In RSA Conference, 2006.
  13. D. Brumley and D. Boneh. Remote timing attacks are practical. Computer Networks, 48(5):701–716, 2005.
  14. Mdptoolbox: a multi-platform toolbox to solve stochastic dynamic programming problems. Ecography, 37(9):916–920, 2014.
  15. Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pages 185–200. IEEE, 2019.
  16. Coinbase. https://www.coinbase.com/.
  17. The pyramid scheme: Oblivious RAM for trusted processors. arXiv preprint arXiv:1712.07882, 2017.
  18. One-way delay measurement: State of the art. IEEE Transactions on Instrumentation and Measurement, 57(12):2742–2750, 2008.
  19. The sad story of dnssec, 2023.
  20. Etherum staking. https://ethereum.org/staking.
  21. Federal Reserve Bank of Atlanta. Survey of consumer payment choice 2020, 2020. https://www.atlantafed.org/-/media/documents/banking/consumer-payments/survey-of-consumer-payment-choice/2020/2020-survey-of-consumer-payment-choice.pdf.
  22. Thomas S. Ferguson. Who Solved the Secretary Problem? Statistical Science, 4(3):282 – 289, 1989. doi:10.1214/ss/1177012493.
  23. Electromagnetic analysis: Concrete results. In Cryptographic Hardware and Embedded Systems – CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 251–261, May 2001.
  24. Ecdsa key extraction from mobile devices via nonintrusive physical side channels. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, page 1626–1638, New York, NY, USA, 2016. Association for Computing Machinery. doi:10.1145/2976749.2978353.
  25. Fast multiparty threshold ECDSA with fast trustless setup. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 1179–1194, 2018.
  26. The 2019 federal reserve payments study. https://www.federalreserve.gov/paymentsystems/2019-December-The-Federal-Reserve-Payments-Study.htm.
  27. A stochastic game of optimal stopping and order selection. Annals of Applied Probability, 5:310–321, 1995. URL: https://api.semanticscholar.org/CorpusID:122457776.
  28. Google LLC. Using OAuth2.0 with OpenID Connect in Google. https://developers.google.com/identity/openid-connect/openid-connect.
  29. Google takes symantec to the woodshed for mis-issuing 30,000 https certs [updated]. https://arstechnica.com/information-technology/2017/03/google-takes-symantec-to-the-woodshed-for-mis-issuing-30000-https-certs/.
  30. Google drops the boom on wosign, startcom certs for good. https://arstechnica.com/information-technology/2017/07/google-drops-the-boom-on-wosign-startcom-certs-for-good/.
  31. Flush+flush: A fast and stealthy cache attack. In DIMVA 2016: Detection of Intrusions and Malware, and Vulnerability Assessment, volume 9721 of Lecture Notes in Computer Science, pages 279–299, 2016.
  32. Cache games – bringing access-based cache attacks on AES to practice. In 32nd IEEE Symposium on Security & Privacy, pages 490–505, 2011.
  33. H100 tensor core GPU | NVIDIA. https://www.nvidia.com/en-us/data-center/h100/.
  34. Proactive secret sharing or: How to cope with perpetual leakage. In Advances in Cryptology – CRYPTO ’95, volume 963 of Lecture Notes in Computer Science, pages 339–352, 1995.
  35. The elliptic curve digital signature algorithm (ecdsa). In International Journal of Information Security. Association for Computing Machinery, July 2001. URL: https://doi.org/10.1007/s102070100002.
  36. Differential power analysis. In Advances in Cryptology – CRYPTO ’99, volume 1666 of Lecture Notes in Computer Science, pages 388–397, August 1999.
  37. P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology – CRYPTO ’96, volume 1109 of Lecture Notes in Computer Science, pages 104–113, 1996.
  38. Ben Laurie. Certificate transparency. Communications of the ACM, 57(10):40–46, 2014.
  39. Let’s encrypt. https://letsencrypt.org/.
  40. Let’s encrypt documentation. https://datatracker.ietf.org/doc/html/rfc8555#section-10.2.
  41. Jiasun Li. On the security of optimistic blockchain mechanisms. Available at SSRN 4499357, 2023.
  42. CIPHERLEAKS: Breaking constant-time cryptography on AMD SEV via the ciphertext side channel. In 30th USENIX Security Symposium, August 2021.
  43. Platypus: Software-based power side-channel attacks on x86. In 2021 IEEE Symposium on Security and Privacy (SP), pages 355–371, 2021. doi:10.1109/SP40001.2021.00063.
  44. Bug bounty programs for cybersecurity: Practices, issues, and recommendations. IEEE Software, 37(1):31–39, 2019.
  45. Innovative instructions and software model for isolated execution. In 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP ’13, page 1, New York, NY, USA, June 2013. Association for Computing Machinery. doi:10.1145/2487726.2488368.
  46. Markov decision process (mdp) toolbox. https://pymdptoolbox.readthedocs.io/en/latest/api/mdptoolbox.html.
  47. ID tokens in the Microsoft identity platform. https://learn.microsoft.com/en-us/azure/active-directory/develop/id-tokens.
  48. A comparison study of intel sgx and amd memory encryption technology. In Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, pages 1–8, 2018.
  49. Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration. In 22nd ACM Conference on Computer and Communications Security, pages 1595–1606, October 2015.
  50. Severity: Code injection attacks against encrypted virtual machines. In 2021 IEEE Security and Privacy Workshops (SPW), pages 444–455, Los Alamitos, CA, USA, may 2021. IEEE Computer Society. URL: https://doi.ieeecomputersociety.org/10.1109/SPW53761.2021.00063, doi:10.1109/SPW53761.2021.00063.
  51. A survey of published attacks on Intel SGX. arXiv preprint arXiv:2006.13598, 2020.
  52. OpenSSL. https://www.openssl.org/, 2023.
  53. Cache attacks and countermeasures: The case of AES. In Topics in Cryptology – CT-RSA 2006, volume 3860 of Lecture Notes in Computer Science, pages 1–20, 2006.
  54. Aaron Parecki. OAuth 2.0 basic information. https://developers.google.com/identity/openid-connect/openid-connect.
  55. J.-J. Quisquater and D. Samyde. Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, volume 2140 of Lecture Notes in Computer Science, pages 200–210, September 2001.
  56. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, page 199–212, New York, NY, USA, 2009. Association for Computing Machinery. doi:10.1145/1653662.1653687.
  57. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Computers & Security, 111:102471, 2021. URL: https://www.sciencedirect.com/science/article/pii/S0167404821002959, doi:https://doi.org/10.1016/j.cose.2021.102471.
  58. Albert N. Shiryaev. Optimal Stopping Rules, pages 1032–1034. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. doi:10.1007/978-3-642-04898-2_433.
  59. Cryptocurrency wallet: A review. In 2020 4th international conference on computer, communication and signal processing (ICCCSP), pages 1–7. IEEE, 2020.
  60. J. Szefer. Survey of microarchitectural side and covert channels, attacks, and defenses. Journal of Hardware and Systems Security, 3:219–234, September 2019.
  61. Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pages 19–34, April 2017. doi:10.1109/EuroSP.2017.28.
  62. Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pages 19–34, 2017. doi:10.1109/EuroSP.2017.28.
  63. Working together to detect maliciously or mistakenly issued certificates. https://certificate.transparency.dev/.
  64. An important statement from trustico. https://www.trustico.com/news/2018/digicert-symantec-statement/set-the-record-straight.php.
  65. Optimal stopping of markov processes: Hilbert space theory, approximation algorithms, and an application to pricing high-dimensional financial derivatives. IEEE Transactions on Automatic Control, 44(10):1840–1851, 1999. doi:10.1109/9.793723.
  66. SGAxe: How SGX fails in practice. https://sgaxeattack.com/, 2020.
  67. A placement vulnerability study in multi-tenant public clouds. In 24th USENIX Security Symposium, August 2015.
  68. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX. In 24th ACM Conference on Computer and Communications Security, October 2017.
  69. A cache timing attack on AES in virtualization environments. In 16th International Conference on Financial Cryptography and Data Security, February 2012.
  70. Gavin Wood et al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1–32, 2014.
  71. Recovering openssl ecdsa nonces using the flush+reload cache side-channel attack. Cryptology ePrint Archive, Paper 2014/140, 2014. https://eprint.iacr.org/2014/140. URL: https://eprint.iacr.org/2014/140.
  72. Martin Young. Coinbase custodies 11% of entire crypto capitalization. URL: https://cointelegraph.com/news/coinbase-custodies-11-of-entire-crypto-capitalization.
  73. Rc-5732: Commit interface: A simple but general commit interface to support commit-reveal scheme. https://eips.ethereum.org/EIPS/eip-5732, September 2022.
  74. Dionysis Zindros. Hours of Horus: Keyless cryptocurrency wallets. Cryptology ePrint Archive, 2021.

Summary

We haven't generated a summary for this paper yet.