Auxiliary Channel Protection
Some confidential execution platforms, such as Secure Execution Zones, depend on hardware to obscure sensitive data. However, this reliance has exposed them to various auxiliary attacks which compromise their privacy and security by allowing information extraction and manipulation. In contrast, BDOZ is based entirely on computational and information-theoretic security, ensuring that as long as security assumptions hold, no malicious peer or group of peers can extract or tamper with data.
Despite this robustness in theory, some implementations of secure multi party computation may still face risks from timing attacks that can occur when attackers analyze differences in response time during data exchange to infer private information, as certain operations take longer depending on the values involved. Corex Network solution is to use constant-time operations, where the execution time is consistent regardless of input, ensuring that data cannot be compromised through such timing-based exploits.
Last updated