Mohamed Sabt’s research while affiliated with French National Centre for Scientific Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (24)


"These results must be false": A usability evaluation of constant-time analysis tools
  • Conference Paper

January 2024

·

9 Reads

·

5 Citations

·

Daniel De Almeida Braga

·

Jan Jancar

·

[...]

·

Yasemin Acar

Cryptography secures our online interactions, transactions, and trust. To achieve this goal, not only do the cryptographic primitives and protocols need to be secure in theory, they also need to be securely implemented by cryptographic library developers in practice. However, implementing cryptographic algorithms securely is challenging, even for skilled professionals, which can lead to vulnerable implementations, especially to side-channel attacks. For timing attacks, a severe class of side-channel attacks , there exist a multitude of tools that are supposed to help cryptographic library developers assess whether their code is vulnerable to timing attacks. Previous work has established that despite an interest in writing constant-time code, cryptographic library developers do not routinely use these tools due to their general lack of usability. However, the precise factors affecting the usability of these tools remain unex-plored. While many of the tools are developed in an academic context, we believe that it is worth exploring the factors that contribute to or hinder their effective use by cryptographic library developers [61]. To assess what contributes to and detracts from usability of tools that verify constant-timeness (CT), we conducted a two-part usability study with 24 (post) graduate student participants on 6 tools across diverse tasks that approximate real-world use cases for cryptographic library developers. We find that all studied tools are affected by similar us-ability issues to varying degrees, with no tool excelling in usability, and usability issues preventing their effective use. Based on our results, we recommend that effective tools for verifying CT need usable documentation, simple installation, easy to adapt examples, clear output corresponding to CT violations , and minimal noninvasive code markup. We contribute first steps to achieving these with limited academic resources, with our documentation, examples, and installation scripts 1. 1 Installation scripts, tasks, documentation and codebook are provided as an artifact, see Footnote 3.


Figure 1: EME Workflow: License Acquisition and Renewal.
Figure 3: EME Widevine Fingerprint Flow.
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME
  • Article
  • Full-text available

October 2023

·

564 Reads

·

1 Citation

Proceedings on Privacy Enhancing Technologies

Thanks to HTML5, users can now view videos on Web browsers without installing plug-ins or relying on specific devices. In 2017, W3C published Encrypted Media Extensions (EME) as the first official Web standard for Digital Rights Management (DRM), with the overarching goal of allowing seamless integration of DRM systems on browsers. EME has prompted numerous voices of dissent with respect to the inadequate protection of users. Of particular interest, privacy concerns were articulated, especially that DRM systems inherently require uniquely identifying information on users' devices to control content distribution better. Despite this anecdotal evidence, we lack a comprehensive overview of how browsers have supported EME in practice and what privacy implications are caused by their implementations. In this paper, we fill this gap by investigating privacy leakage caused by EME relying on proprietary and closed-source DRM systems. We focus on Google Widevine because of its versatility and wide adoption. We conduct empirical experiments to show that browsers diverge when complying EME privacy guidelines, which might undermine users' privacy. For instance, we find that many browsers gladly give away the identifying Widevine Client ID with no or little explicit consent from users. Moreover, we characterize the privacy risks of users tracking when browsers miss applying EME guidelines regarding privacy. Because of being closed-source, our work involves reverse engineering to dissect the contents of EME messages as instantiated by Widevine. Finally, we implement EME Track, a tool that automatically exploits bad Widevine-based implementations to break privacy.

Download

Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME

August 2023

·

26 Reads

Thanks to HTML5, users can now view videos on Web browsers without installing plug-ins or relying on specific devices. In 2017, W3C published Encrypted Media Extensions (EME) as the first official Web standard for Digital Rights Management (DRM), with the overarching goal of allowing seamless integration of DRM systems on browsers. EME has prompted numerous voices of dissent with respect to the inadequate protection of users. Of particular interest, privacy concerns were articulated, especially that DRM systems inherently require uniquely identifying information on users' devices to control content distribution better. Despite this anecdotal evidence, we lack a comprehensive overview of how browsers have supported EME in practice and what privacy implications are caused by their implementations. In this paper, we fill this gap by investigating privacy leakage caused by EME relying on proprietary and closed-source DRM systems. We focus on Google Widevine because of its versatility and wide adoption. We conduct empirical experiments to show that browsers diverge when complying EME privacy guidelines, which might undermine users' privacy. For instance, we find that many browsers gladly give away the identifying Widevine Client ID with no or little explicit consent from users. Moreover, we characterize the privacy risks of users tracking when browsers miss applying EME guidelines regarding privacy. Because of being closed-source, our work involves reverse engineering to dissect the contents of EME messages as instantiated by Widevine. Finally, we implement EME Track, a tool that automatically exploits bad Widevine-based implementations to break privacy.






Exploring Widevine for Fun and Profit

April 2022

·

43 Reads

For years, Digital Right Management (DRM) systems have been used as the go-to solution for media content protection against piracy. With the growing consumption of content using Over-the-Top platforms, such as Netflix or Prime Video, DRMs have been deployed on numerous devices considered as potential hostile environments. In this paper, we focus on the most widespread solution, the closed-source Widevine DRM. Installed on billions of devices, Widevine relies on cryptographic operations to protect content. Our work presents a study of Widevine internals on Android, mapping its distinct components and bringing out its different cryptographic keys involved in content decryption. We provide a structural view of Widevine as a protocol with its complete key ladder. Based on our insights, we develop WideXtractor, a tool based on Frida to trace Widevine function calls and intercept messages for inspection. Using this tool, we analyze Netflix usage of Widevine as a proof-of-concept, and raised privacy concerns on user-tracking. In addition, we leverage our knowledge to bypass the obfuscation of Android Widevine software-only version, namely L3, and recover its Root-of-Trust.


Fig. 1. Leaky pipeline of developers' knowledge and use of tools for testing or verifying constant-timeness.
Fig. 2. Survey flow as shown to participants.
"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks

December 2021

·

132 Reads

·

43 Citations

Timing attacks are among the most devastating side-channel attacks, allowing remote attackers to retrieve secret material, including cryptographic keys, with relative ease. In principle, "these attacks are not that hard to mitigate": the basic intuition, captured by the constant-time criterion, is that control-flow and memory accesses should be independent from secrets. Furthermore, there is a broad range of tools for automatically checking adherence to this intuition. Yet, these attacks still plague popular cryptographic libraries twenty-five years after their discovery, reflecting a dangerous gap between academic research and cryptographic engineering. This gap can potentially undermine the emerging shift towards high-assurance, formally verified cryptographic libraries. However, the causes for this gap remain uninvestigated. To understand the causes of this gap, we conducted a survey with 44 developers of 27 prominent open-source cryptographic libraries. The goal of the survey was to analyze if and how the developers ensure that their code executes in constant time. Our main findings are that developers are aware of timing attacks and of their potentially dramatic consequences and yet often prioritize other issues over the perceived huge investment of time and resources currently needed to make their code resistant to timing attacks. Based on the survey, we identify several shortcomings in existing analysis tools for constant-time, and issue recommendations that can make writing constant-time libraries less difficult. Our recommendations can inform future development of analysis tools, security-aware compilers, and cryptographic libraries, not only for constant-timeness, but in the broader context of side-channel attacks, in particular for micro-architectural side-channel attacks, which are a younger topic and too recent as focus for this survey.



Citations (15)


... An actively maintained online list of "constant-timeness' verification tools (CT-tools) contains, at the time of writing, 55 different tools [13]. However, testing whether a program is data-oblivious remains challenging as these tools are typically not integrated into modern toolchains, have significant technical limitations including high overheads to compilation time, and high-numbers of false-positives, and are difficult to use [27,30,39]. The principal shortcoming of static analysis approaches is that data-obliviousness can only be defined at machine-code level, rather than for high-level language constructs. ...

Reference:

BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
"These results must be false": A usability evaluation of constant-time analysis tools
  • Citing Conference Paper
  • January 2024

... Recently, [35, FLEDGE API), subsequently fixed (favicon cache, Alt-Svc), or of limited impact (CORS Preflight -only effective for two hours). A device tracking technique based on the Widevine EME DRM standard is described in [36]. While they did not test browsers on Fuchsia, they do note that Chrome for Android (probably the closest target to Fuchsia they tested) is not vulnerable to their attack, which suggests that Chrome on Fuchsia is not vulnerable as well. ...

Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME

Proceedings on Privacy Enhancing Technologies

... In any case, cryptography is also a good example otherwise; among other things, some publications have analyzed insecure use of cryptographic libraries; hence, secure defaults should be provided in these. Insecure defaults are indirectly reflected also in observations that some cryptographic libraries are prone to side-channel attacks [12]. Regarding other common protocols: while the transport layer protocol (TLS) is the de facto one for the today's world wide web, electronic mail is still unencrypted by default, which has motivated some to try to improve the situation [19]. ...

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
  • Citing Conference Paper
  • July 2023

... This motivates a thorough analysis before revoking tokens. However, thorough analysis is expensive, consuming resources such as computational power and energy, and causing delays, which can affect legitimate users and can preclude the timely blocking of illegal users [3,9]. ...

WideLeak: How Over-the-Top Platforms Fail in Android
  • Citing Conference Paper
  • June 2022

... To ensure that assumptions on the underlying hardware are correct and to create a complete feedback loop, developers should also perform timing measurements as a final validation step to ensure the absence of exploitable side channels. Unfortunately, as highlighted by a recent study by Jancar et al. [30], developers often avoid measurements due to the perceived unreliability of the statistical analysis and its guarantees. ...

"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks

... In the first case, developers keep vulnerable functions in the code-base for performance reasons, carefully avoiding using them when manipulating secret data. This leaves the door open to new vulnerabilities where these known-vulnerable functions are used in a new context (e.g., using square-and-multiply in RSA key generation) [20,21,1,7,5]. In the second case, the lack of developer awareness may prevent side-channel mitigation transfer from one library to the other [11]. ...

PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
  • Citing Conference Paper
  • November 2021

... Security proof is crucial for encryption schemes. In this scheme, security threats are discussed, such as collusion attacks [11][12][13], and corresponding solutions are proposed. This security analysis ensure that the schemes are not compromised by potential threats in practical applications. ...

Implementation of Lattice Trapdoors on Modules and Applications
  • Citing Chapter
  • July 2021

Lecture Notes in Computer Science

... Standardization bodies should try to avoid the use of cryptographic algorithms leaking timing information. In the case of Dragonfly Password Authenticated Scheme used in WPA3 by the Wi-Fi Alliance, many timing attacks have been discovered [372,62] as the algorithm leaks timing information. However, many deterministic algorithms with no leaks are known [333]. ...

Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
  • Citing Conference Paper
  • December 2020