Goblin is the first non-profiling, single-trace timing SCA that successfully extracts the user’s input, which, by definition, should have been kept secret.
To use Goblin, please refer to our GitHub repository: Goblin package
Goblin is machine-learning assisted in disclosing the garbler’s input, regardless of size. For this purpose, k-means clustering is applied, where no manual tuning or heuristic leakage models are needed. It is, of course, advantageous to the attacker and allows for scalable and efficient attacks.
The free-XOR- and half-gates-optimized constructions are vulnerable to Goblin attack.
The existence of these unbalanced IFs demonstrates the likelihood of timing attacks to be successfully mounted against them.
To examine this, SC-Eliminator [1] is applied against TinyGarble [2], JustGarble [3], EMP-toolkit [4], Obliv-C [5], and ABY [6], and here is the leaky IF reports:
Framework | IF |
TinyGarble [2] (half-gate) | 4 |
TinyGarble [2] (free-XOR) | 7 |
JustGarble [3] | 11 |
EMP-toolkit [4] | 0 |
Obliv-c [5] | 4 |
ABY [6] | 0 |
For more information, please refer to Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions.
@article{hashemi2023time,
title={Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions},
author={Hashemi, Mohammad and Forte, Domenic and Ganji, Fatemeh},
journal={Cryptology ePrint Archive},
year={2023}
}
23 October 2024
Check out Goblin, our new timing sie-channel attack against Garbled Circuit constructions. Goblin.
9 December 2022
CHES 2023 published our work on On-chip Impedance Sensing for System Tampering Detection.
8 December 2022
Welcome to our all-new WPI CHIPS Lab site!