Crates.io | sidefuzz |
lib.rs | sidefuzz |
version | 0.1.2 |
source | src |
created_at | 2019-04-30 21:38:30.666004 |
updated_at | 2019-05-02 16:51:06.741627 |
description | Fuzzer to automatically find side-channel (timing) vulnerabilities |
homepage | |
repository | https://github.com/phayes/sidefuzz |
max_upload_size | |
id | 131249 |
size | 12,344 |
SideFuzz is an adaptive fuzzer that uses a genetic-algorithim optimizer in combination with t-statistics to find side-channel (timing) vulnerabilities in cryptography compiled to wasm.
Fuzzing Targets can be found here: https://github.com/phayes/sidefuzz-targets
SideFuzz works by counting instructions executed in the wasmi wasm interpreter. It works in two phases:
Phase 1. Uses a genetic-algorithim optimizer that tries to maximize the difference in instructions executed between two different inputs. It will continue optimizing until subsequent generations of input-pairs no longer produce any meaningful differences in the number of instructions executed. This means that it will optimize until it finds finds a local optimum in the fitness of input pairs.
Phase 2. Once a local optimum is found, the leading input-pairs are sampled until either:
A large t-statistic (p = 0.001) is found, indicating that there is a statistically significant difference in running-time between the two inputs. This is indicative of a timing side-channel vulnerability; or
The t-statistic stays low, even after significant sampling. In this case the candidate input pairs are rejected and SideFuzz returns to phase 1, resuming the genetic-algorithim optimizer to find another local optimum.
Fuzzing with SideFuzz shows that your Rust code can be constant-time, but doesn't show that it is constant-time on all architectures. This is because LLVM backends can and will ruin constant-time Rust / LLVM-IR when compiling to machine-code. SideFuzz should be considered a "good first step" to be followed up with dudect-bencher and ctgrind. It should also be noted that proper compiler support for constant-time code-generation is an unsolved problem in the Rust ecosystem. There have been some ideas around using cranelift for constant-time code generation, but things are still in the brainstorming phase.
rustup target add wasm32-unknown-unknown
git clone git@github.com:phayes/sidefuzz.git
cd sidefuzz && cargo install --path .
(Cannot currently do cargo install sidefuzz
because of this issue)
Creating a target in rust is very easy.
// lib.rs
#[no_mangle]
pub extern "C" fn fuzz() {
let input = sidefuzz::fetch_input(32); // 32 bytes of of fuzzing input as a &[u8]
sidefuzz::black_box(my_hopefully_constant_fn(input));
}
# Cargo.toml
[lib]
crate-type = ["cdylib"]
[dependencies]
sidefuzz = "0.1.1"
Compile and fuzz the target like so:
cargo build --release --target wasm32-unknown-unknown # Always build in release mode
sidefuzz fuzz ./target/wasm32-unknown-unknown/release/my_target.wasm # Fuzzing!
Results can be checked like so:
sidefuzz check my_target.wasm 01250bf9 ff81f7b3
When fixing variable-time code, sidefuzz can also help with sidefuzz count
to quickly count the number of instructions executed by the target.
cargo build --release && sidefuzz count my_target.wasm 01250bf9
SideFuzz works with Go, C, C++ and other langauges that compile to wasm.
The wasm module should provide four exports:
Memory exported to "memory"
A function named "fuzz". This function will be repeatedly called during the fuzzing process.
A function named "input_pointer" that returns an i32 pointer to a location in linear memory where we can can write an array of input bytes. The "fuzz" fuction should read this array of bytes as input for it's fuzzing.
A function named "input_len" that returns an i32 with the desired length of input in bytes.
Web Assembly allows us to precisely track the number of instructions executed, the type of instructions executed, and the amount of memory used. This is much more precise than other methods such as tracking wall-time or counting CPU cycles.
Many constant-time functions include calls to variable-time debug_assert!()
functions that get removed during a release build. Rust's and LLVM optimizer may also mangle supposedly constant-time code in the name of optimization, introducing subtle timing vulnerabilities. Runnig in release mode let's us surface these issues.
You should make use of a PRNG with a static seed. While this is a bad idea for production code, it's great for fuzzing. See the rsa_encrypt_pkcs1v15_message target for an example on how to do this.
black_box
?sidefuzz::black_box
is used to avoid dead-code elimination. Because we are interested in exercising the fuzzed code instead of getting results from it, the exported fuzz
function doesn't return anything. The Rust optimizer sees all functions that don't return as dead-code and will try to eliminate them as part of it's optimizations. black_box
is a function that is opaque to the optimizer, allowing us to exercise functions that don't return without them being optimized away. It should be used whenever calling a function that doesn't return anything or where we are ignoring the output returned.
You should panic (causing a wasm trap). This will signal to the fuzzer that the inputs are invalid.
You should use lazy_static
to do any set-up work (like generating keys etc). The target is always run once to prime lazy statics before the real fuzzing starts.
dudect-bencher
. An implementation of the DudeCT constant-time function tester. In comparison to SideFuzz, this tool more closely adheres to the original dudect design. https://crates.io/crates/dudect-bencher
ctgrind
. Tool for checking that functions are constant time using Valgrind. https://github.com/RustCrypto/utils/tree/master/ctgrind
"DifFuzz: Differential Fuzzing for Side-Channel Analysis", Nilizadeh et al. https://arxiv.org/abs/1811.07005
"Dude, is my code constant time?", Reparaz et al. https://eprint.iacr.org/2016/1123.pdf
"Rust, dudect and constant-time crypto in debug mode", brycx. https://brycx.github.io/2019/04/21/rust-dudect-constant-time-crypto.html