Skiplist Timing Attack Vulnerability

Eyal Nussbaum, Michael Segal

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper we address the structure and behavior of the probabilistic Skiplist data structure and present an exploit in the form of a timing attack on the structure. In this exploit, we show how to map the presumably hidden structure of a Skiplist by timing the return time of search queries. This data can then be used to perform operations on the Skiplist which will cause a degradation in its subsequent performance. In addition, we describe another exploitation of this data to use the Skiplist as a means of creating a hidden channel between two attackers. Finally, we propose a new variant of Skiplist we call a Splay Skiplist, which retains the $$O(\log n)$$ performance of Skiplist while defending against the stated exploit.

Original languageEnglish
Title of host publicationData Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Proceedings
EditorsCristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro
PublisherSpringer
Pages49-58
Number of pages10
ISBN (Print)9783030314996
DOIs
StatePublished - 1 Jan 2019
Event14th International Workshop on Data Privacy Management, DPM 2019, and the 3rd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019 - Luxembourg, Luxembourg
Duration: 26 Sep 201927 Sep 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11737 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Workshop on Data Privacy Management, DPM 2019, and the 3rd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019
Country/TerritoryLuxembourg
CityLuxembourg
Period26/09/1927/09/19

Keywords

  • Complexity
  • Data structures
  • Security
  • Skiplist
  • Timing attacks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Skiplist Timing Attack Vulnerability'. Together they form a unique fingerprint.

Cite this