A Tale of Resilience: On the Practical Security of Masked Software Implementations

被引:0
|
作者
Casalino, Lorenzo [1 ]
Belleville, Nicolas [1 ]
Courousse, Damien [1 ]
Heydemann, Karine [2 ,3 ]
机构
[1] Univ Grenoble Alpes, CEA, List, F-38000 Grenoble, France
[2] Thales DIS, F-13590 Meyreuil, France
[3] Sorbonne Univ, CNRS, LIP6, F-75005 Paris, France
关键词
Security; Encoding; Resilience; Random variables; Registers; Side-channel attacks; Microarchitecture; Software engineering; Masking; processor micro-architecture; side-channel analysis; software masking;
D O I
10.1109/ACCESS.2023.3298436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. Furthermore, these techniques implicitly induce some form of parallelism, and the potential associated threat has never been investigated. In addition, the practical security of masking relies on the chosen masking scheme. Few works analysed the security of software protected by different masking schemes, and none considered the parallelism threat. Thus, literature lacks of a more comprehensive investigation on the practical security of software implementations relying on various masking schemes in presence of micro-architecture-induced recombination effects and parallelism. This work performs a first step to fill this gap. Specifically, we evaluate the practical security offered by first-order Boolean, arithmetic-sum and inner-product masking against transitions and parallelism in software. We firstly assess the presence of transition and parallel-based leakages in software. Secondly, we evaluate the security of the encodings of the selected masking schemes with respect to each leakage source via micro-benchmarks. Thirdly, we assess the practical security of different AES-128 software implementations, one for each selected masking scheme. We carry out the investigation on the STM32F215 and STM32F303 micro-controllers. We show that 1) CPU's parallel features allow successful attacks against masked implementations resistant to transition-based leakages; 2) implementation choices (e.g., finite field multiplication) impact on the practical security of masked software implementations in presence of recombination effects.
引用
收藏
页码:84651 / 84669
页数:19
相关论文
共 50 条
  • [1] On the Security of Partially Masked Software Implementations
    Barenghi, Alessandro
    Pelosi, Gerardo
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 492 - 499
  • [2] Secure Context Switching of Masked Software Implementations
    Gigerl, Barbara
    Primas, Robert
    Mangard, Stefan
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 980 - 992
  • [3] Does Coupling Affect the Security of Masked Implementations?
    De Cnudde, Thomas
    Bilgin, Begul
    Gierlichs, Benedikt
    Nikov, Ventzislav
    Nikova, Svetla
    Rijmen, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 1 - 18
  • [4] Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended
    Bronchain, Olivier
    Durvaux, Francois
    Masure, Loic
    Standaert, Francois-Xavier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 574 - 584
  • [5] VerMI: Verification Tool for Masked Implementations
    Arribas, Victor
    Nikova, Svetla
    Rijmen, Vincent
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2018, : 381 - 384
  • [6] VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
    Meunier, Quentin L.
    Taleb, Abdul Rahman
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 520 - 527
  • [7] Formal Verification of Masked Hardware Implementations in the Presence of Glitches
    Bloem, Roderick
    Gross, Hannes
    Iusupov, Rinat
    Koenighofer, Bettina
    Mangard, Stefan
    Winter, Johannes
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 321 - 353
  • [8] Exploring the Use of PHM for Software System Security and Resilience
    Murthy, Rajesh
    2023 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT, ICPHM, 2023, : 67 - 72
  • [9] A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
    Masure, Loic
    Rioul, Olivier
    Standaert, Francois-Xavier
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022, 2023, 13820 : 69 - 81
  • [10] ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification
    de Grandmaison, Arnaud
    Heydemann, Karine
    Meunier, Quentin L.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (11) : 3733 - 3744