Information Bounds and Convergence Rates for Side-Channel Security Evaluators

被引:0
|
作者
Masure L. [1 ]
Cassiers G. [2 ]
Hendrickx J. [1 ]
Standaert F.-X. [1 ]
机构
[1] UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve
[2] TU Graz, Graz
基金
欧洲研究理事会;
关键词
Perceived Information; Profiled Attacks; Training Information;
D O I
10.46586/tches.v2023.i3.522-569
中图分类号
学科分类号
摘要
Current side-channel evaluation methodologies exhibit a gap between inefficient tools offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes case-specific) guarantees. Profiled attacks based on the empirical leakage distribution correspond to the first category. Bronchain et al. showed at Crypto 2019 that they allow bounding the worst-case security level of an implementation, but the bounds become loose as the leakage dimensionality increases. Template attacks and machine learning models are examples of the second category. In view of the increasing popularity of such parametric tools in the literature, a natural question is whether the information they can extract can be bounded. In this paper, we first show that a metric conjectured to be useful for this purpose, the hypothetical information, does not offer such a general bound. It only does when the assumptions exploited by a parametric model match the true leakage distribution. We therefore introduce a new metric, the training information, that provides the guarantees that were conjectured for the hypothetical information for practically-relevant models. We next initiate a study of the convergence rates of profiled side-channel distinguishers which clarifies, to the best of our knowledge for the first time, the parameters that influence the complexity of a profiling. On the one hand, the latter has practical consequences for evaluators as it can guide them in choosing the appropriate modeling tool depending on the implementation (e.g., protected or not) and contexts (e.g., granting them access to the countermeasures’ randomness or not). It also allows anticipating the amount of measurements needed to guarantee a sufficient model quality. On the other hand, our results connect and exhibit differences between side-channel analysis and statistical learning theory. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:522 / 569
页数:47
相关论文
共 50 条
  • [1] Leveraging Side-Channel Information for Disassembly and Security
    Park, Jungmin
    Rahman, Fahim
    Vassilev, Apostol T.
    Forte, Domenic
    Tehranipoor, Mark
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2020, 16 (01)
  • [2] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [3] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [4] Side-channel security of superscalar CPUs
    Barenghi, Alessandro
    Pelosi, Gerardo
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [5] Leveraging Timing Side-Channel Information and Machine Learning for IoT Security
    Sahu, Kratika
    Kshirsagar, Rasika
    Vasudeva, Surbhi
    Alzahrani, Taghreed
    Karimian, Nima
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [6] Information component of national security and its relevant to side-channel analysis
    Martynyuk, V
    Vasyltsov, I
    MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2004, : 298 - 298
  • [7] Automatically deriving information-theoretic bounds for adaptive side-channel attacks
    Koepf, Boris
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) : 1 - 31
  • [8] Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    ENTROPY, 2019, 21 (05):
  • [9] Enhancing Information Security Courses With a Remotely Accessible Side-Channel Analysis Setup
    Abdulgadir, Abubakr
    Kaps, Jens-Peter
    Salman, Ahmad
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 531 - 536
  • [10] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133