Definition

A side-channel attack exploits information leaked through the physical or operational characteristics of a computing system, rather than targeting weaknesses in the cryptographic algorithm or software logic itself. The attacker observes indirect signals—execution timing, power draw, electromagnetic radiation, acoustic emissions, cache behavior, or memory access patterns—to infer secrets that the system was designed to protect.

The concept was formalized by Paul Kocher in 1996 with timing attacks against RSA and Diffie-Hellman implementations. Kocher demonstrated that by measuring the time a server took to process cryptographic operations, an attacker could deduce the private key bit by bit. The attack did not break RSA’s mathematics—it broke the assumption that computation time was uniform regardless of key value. Since then, side-channel attacks have evolved into a rich family of techniques that target the gap between theoretical cryptographic security and real-world implementation.

Why It Matters

The 2018 disclosure of Spectre and Meltdown—speculative execution side-channel vulnerabilities affecting virtually every modern processor from Intel, AMD, and ARM—demonstrated that side channels are not niche academic concerns. Spectre (CVE-2017-5753, CVE-2017-5715) affects an estimated 4 billion devices worldwide. The initial patches for Spectre and Meltdown imposed performance penalties of 5-30% on affected processors, costing cloud providers billions in degraded throughput.

In the cloud computing context, side channels are particularly dangerous because multiple tenants share physical hardware. A 2024 study from ETH Zurich demonstrated a cache-based side-channel attack that extracted AES encryption keys from a co-located virtual machine in a public cloud environment with 98.7% accuracy. The attack required no network access to the target—only co-residence on the same physical host.

For AI inference workloads, emerging research has demonstrated token-length side channels: by observing the timing and packet sizes of streamed LLM responses, attackers on the same network can infer the approximate content of responses without decrypting them. This class of attack targets the metadata of communication, not its content.

How It Works

Side-channel attacks exploit measurable physical or behavioral signals:

  1. Timing attacks: Measure the time taken by cryptographic operations. If an implementation performs different operations for different key bits (e.g., conditional branches in modular exponentiation), the execution time varies measurably. Constant-time implementations mitigate this by ensuring execution time is independent of secret values.

  2. Cache attacks: Exploit shared CPU caches in multi-tenant environments. Techniques like Flush+Reload, Prime+Probe, and Evict+Time allow an attacker to determine which memory addresses a victim process accessed. Since memory access patterns correlate with data-dependent execution paths, cache observations can reveal secret keys.

  3. Power analysis: Measure a device’s power consumption during cryptographic operations. Simple Power Analysis (SPA) examines a single power trace. Differential Power Analysis (DPA) uses statistical methods across many traces to extract key material. These attacks primarily target embedded devices and hardware security modules.

  4. Electromagnetic emanations: Capture electromagnetic radiation emitted by circuits during computation. TEMPEST-class attacks can reconstruct screen contents, keystrokes, or cryptographic operations from EM emissions captured at a distance.

  5. Microarchitectural attacks: Exploit speculative execution (Spectre), out-of-order execution (Meltdown), branch prediction, and other CPU optimization features. These attacks exploit the gap between the architectural model (what the CPU is supposed to do) and the microarchitectural implementation (what it actually does to go faster).

Stealth Cloud Relevance

Stealth Cloud addresses side-channel risks through architectural minimization of attackable state. Ghost Chat processes data in Cloudflare’s V8 isolates—lightweight execution environments that provide stronger isolation than traditional container-based multi-tenancy. V8 isolates do not share memory address spaces, reducing the attack surface for cache-based side channels.

The zero-persistence architecture further limits side-channel exposure: because no conversation data persists in memory beyond the active request, the window for timing or cache-based observation is measured in milliseconds rather than the minutes or hours required for most practical side-channel attacks. Cryptographic shredding ensures that even if a side channel leaked partial key material, the key is destroyed before a full extraction is feasible.

The threat model for Stealth Cloud explicitly accounts for side channels. End-to-end encryption via the Web Crypto API uses constant-time implementations provided by the browser’s native cryptographic library, mitigating timing attacks against key operations. Token-length side channels in LLM streaming are addressed by response padding and uniform chunk sizes, preventing packet-level inference of response content.

The Stealth Cloud Perspective

Side-channel attacks prove that encrypting data is necessary but not sufficient—the manner of computation itself can betray secrets. Stealth Cloud defends against side channels by minimizing what there is to observe: ephemeral processing, zero persistence, and constant-time cryptography reduce the signal an attacker can capture to noise.