A Survey of Side-Channel Leakage Assessment

被引:3
|
作者
Wang, Yaru [1 ,2 ]
Tang, Ming [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
leakage assessment technology; side channel attack; TVLA; leakage detection; POWER-ANALYSIS; COUNTERMEASURES; ATTACKS;
D O I
10.3390/electronics12163461
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more threatening side-channel attacks (SCAs) are being proposed, the security of cryptographic products is seriously challenged. This has prompted both academia and industry to evaluate the security of these products. The security assessment is divided into two styles: attacking-style assessment and leakage detection-style assessment. In this paper, we will focus specifically on the leakage detection-style assessment. Firstly, we divide the assessment methods into Test Vector Leakage Assessment (TVLA) and its optimizations and summarize the shortcomings of TVLA. Secondly, we categorize the various optimization schemes for overcoming these shortcomings into three groups: statistical tool optimizations, detection process optimizations, and decision strategy optimizations. We provide concise explanations of the motivations and processes behind each scheme, as well as compare their detection efficiency. Through our work, we conclude that there is no single optimal assessment scheme that can address all shortcomings of TVLA. Finally, we summarize the purposes and conditions of all leakage detection methods and provide a detection strategy for actual leakage detection. Additionally, we discuss the current development trends in leakage detection.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [2] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [3] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [4] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +
  • [5] Side-Channel Leakage across Borders
    Schmidt, Joern-Marc
    Plos, Thomas
    Kirschbaum, Mario
    Hutter, Michael
    Medwed, Marcel
    Herbst, Christoph
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
  • [6] Improving Side-channel Leakage Assessment Using Pre-silicon Leakage Models
    Shanmugam, Dillibabu
    Schaumont, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2023, 2023, 13979 : 105 - 124
  • [7] A Frequency-based Leakage Assessment Methodology for Side-Channel Evaluations
    Lei, Wan
    Wang, Lihui
    Shan, Weijun
    Jiang, Kun
    Li, Qing
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 590 - 593
  • [8] Test Vector Leakage Assessment Technique of Side-channel Power Information
    Zheng Z.
    Yan Y.
    Liu Y.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3109 - 3117
  • [9] A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT
    Huang, Zitian
    Wang, Huanyu
    Cao, Bijia
    He, Dalin
    Wang, Junnian
    INTERNET OF THINGS, 2024, 27
  • [10] Side-channel leakage of masked CMOS gates
    Mangard, S
    Popp, T
    Gammel, BM
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 351 - 365