Security researchers and crypto implementers seem to take timing attacks quite seriously, putting a lot of effort into making the crucial crypto steps run in constant time.
As I understand it, the "internal knowledge" needed for timing attacks
is mostly what is easily discoverable from the open source-code of the
SW that is attacked.
On 2024-07-21 03:04, Lawrence D'Oliveiro wrote:
On Sat, 20 Jul 2024 11:08:47 +0200, Dmitry A. Kazakov wrote:
Why on earth do we need security updates?
Because computer systems are complex, and new bugs keep being
discovered all the time.
This does not make sense. You can create a very complex system out of screwdrivers and still each screwdriver would require no update.
Le 21/07/2024 à 10:00, Niklas Holsti a écrit :
But certainly, most attacks on SW have used functional bugs such as
buffer overflows.
A problem that has been solved since 1983, and even before (Pascal had
bounds checking). Sigh...
Considering many many layers of software to predict timing from code in uncontrolled environment would be a challenge.
On Sun, 21 Jul 2024 11:10:06 +0200, J-P. Rosen wrote:
Le 21/07/2024 à 10:00, Niklas Holsti a écrit :
But certainly, most attacks on SW have used functional bugs such as
buffer overflows.
A problem that has been solved since 1983, and even before (Pascal had
bounds checking). Sigh...
Pascal had no checking for memory leaks or double-frees.
Rust certainly seems to be a next-generation solution to these sorts of memory problems.
On Sun, 21 Jul 2024 09:22:06 +0200, Dmitry A. Kazakov wrote:
If you have a box full of screwdrivers, then all you have is a box full of screwdrivers.
If you have a computer system made up of a bunch of modules interacting
with each other, then you could have, potentially, quite a complex system indeed.
Look up the term “combinatorial explosion” to learn more.
Le 21/07/2024 à 23:53, Lawrence D'Oliveiro a écrit :
On Sun, 21 Jul 2024 11:10:06 +0200, J-P. Rosen wrote:
Le 21/07/2024 à 10:00, Niklas Holsti a écrit :
But certainly, most attacks on SW have used functional bugs such as
buffer overflows.
A problem that has been solved since 1983, and even before (Pascal had
bounds checking). Sigh...
Pascal had no checking for memory leaks or double-frees.
Rust certainly seems to be a next-generation solution to these sorts of
memory problems.
We were talking about bounds checking, that Pascal had.
On 2024-07-21 23:52, Lawrence D'Oliveiro wrote:
On Sun, 21 Jul 2024 09:22:06 +0200, Dmitry A. Kazakov wrote:
If you have a box full of screwdrivers, then all you have is a box full
of screwdrivers.
If you have a computer system made up of a bunch of modules interacting
with each other, then you could have, potentially, quite a complex
system indeed.
Tight coupling = bad design.
On Mon, 22 Jul 2024 09:16:09 +0200, Dmitry A. Kazakov wrote:
On 2024-07-21 23:52, Lawrence D'Oliveiro wrote:
On Sun, 21 Jul 2024 09:22:06 +0200, Dmitry A. Kazakov wrote:
If you have a box full of screwdrivers, then all you have is a box full
of screwdrivers.
If you have a computer system made up of a bunch of modules interacting
with each other, then you could have, potentially, quite a complex
system indeed.
Tight coupling = bad design.
And yet you are relying on those systems right now. Do you do online payments/banking? You depend on those systems crucially for that.
On 2024-07-23 03:49, Lawrence D'Oliveiro wrote:
On Mon, 22 Jul 2024 09:16:09 +0200, Dmitry A. Kazakov wrote:
On 2024-07-21 23:52, Lawrence D'Oliveiro wrote:
On Sun, 21 Jul 2024 09:22:06 +0200, Dmitry A. Kazakov wrote:
If you have a box full of screwdrivers, then all you have is a box
full of screwdrivers.
If you have a computer system made up of a bunch of modules
interacting with each other, then you could have, potentially, quite
a complex system indeed.
Tight coupling = bad design.
And yet you are relying on those systems right now. Do you do online
payments/banking? You depend on those systems crucially for that.
I don't understand your point. Should I bubble with joy each time it
crashes or gets compromised?
| Sysop: | DaiTengu |
|---|---|
| Location: | Appleton, WI |
| Users: | 1,090 |
| Nodes: | 10 (1 / 9) |
| Uptime: | 59:51:44 |
| Calls: | 13,948 |
| Calls today: | 1 |
| Files: | 187,035 |
| D/L today: |
2,695 files (773M bytes) |
| Messages: | 2,461,298 |