A Tale of Resilience: On the Practical Security of Masked Software Implementations

被引:0
|
作者
Casalino, Lorenzo [1 ]
Belleville, Nicolas [1 ]
Courousse, Damien [1 ]
Heydemann, Karine [2 ,3 ]
机构
[1] Univ Grenoble Alpes, CEA, List, F-38000 Grenoble, France
[2] Thales DIS, F-13590 Meyreuil, France
[3] Sorbonne Univ, CNRS, LIP6, F-75005 Paris, France
关键词
Security; Encoding; Resilience; Random variables; Registers; Side-channel attacks; Microarchitecture; Software engineering; Masking; processor micro-architecture; side-channel analysis; software masking;
D O I
10.1109/ACCESS.2023.3298436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. Furthermore, these techniques implicitly induce some form of parallelism, and the potential associated threat has never been investigated. In addition, the practical security of masking relies on the chosen masking scheme. Few works analysed the security of software protected by different masking schemes, and none considered the parallelism threat. Thus, literature lacks of a more comprehensive investigation on the practical security of software implementations relying on various masking schemes in presence of micro-architecture-induced recombination effects and parallelism. This work performs a first step to fill this gap. Specifically, we evaluate the practical security offered by first-order Boolean, arithmetic-sum and inner-product masking against transitions and parallelism in software. We firstly assess the presence of transition and parallel-based leakages in software. Secondly, we evaluate the security of the encodings of the selected masking schemes with respect to each leakage source via micro-benchmarks. Thirdly, we assess the practical security of different AES-128 software implementations, one for each selected masking scheme. We carry out the investigation on the STM32F215 and STM32F303 micro-controllers. We show that 1) CPU's parallel features allow successful attacks against masked implementations resistant to transition-based leakages; 2) implementation choices (e.g., finite field multiplication) impact on the practical security of masked software implementations in presence of recombination effects.
引用
收藏
页码:84651 / 84669
页数:19
相关论文
共 50 条
  • [11] Climate resilience and food security in Central America: a practical framework
    Bizikova, Livia
    Tyler, Stephen
    Moench, Marcus
    Keller, Marius
    Echeverria, Daniella
    CLIMATE AND DEVELOPMENT, 2016, 8 (05) : 397 - 412
  • [12] Exploring Multi-task Learning in the Context of Masked AES Implementations
    Marquet, Thomas
    Oswald, Elisabeth
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024, 2024, 14595 : 93 - 112
  • [13] Successfully attacking masked AES hardware implementations
    Mangard, S
    Pramstaller, N
    Oswald, E
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 157 - 171
  • [14] No Resilience without Security
    Dyka, Z.
    Vogel, E.
    Kabin, I
    Klann, D.
    Shamilyan, O.
    Langendoerfer, P.
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 83 - 87
  • [15] Security beyond resilience
    Grove, Kevin J.
    ENVIRONMENT AND PLANNING D-SOCIETY & SPACE, 2017, 35 (01) : 184 - 194
  • [16] Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
    Khandker, Syed
    Turtiainen, Hannu
    Costin, Andrei
    Hamalainen, Timo
    IEEE ACCESS, 2022, 10 : 29493 - 29505
  • [17] Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-Sliced Implementations
    D'Anvers, Jan-Pieter
    Van Beirendonck, Michiel
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (02) : 321 - 332
  • [18] Resilience, security and the politics of processes
    Juntunen, Tapio
    Hyvonen, Ari-Elmeri
    RESILIENCE-INTERNATIONAL POLICIES PRACTICES AND DISCOURSES, 2014, 2 (03): : 195 - 209
  • [19] Harmonized taxonomies for security and resilience
    Thompson, Marcus A.
    Ryan, Michael J.
    Slay, Jill
    McLucas, Alan C.
    INFORMATION SECURITY JOURNAL, 2016, 25 (1-3): : 54 - 67
  • [20] Risk and resilience: strategies for security
    Helm, Patrick
    CIVIL ENGINEERING AND ENVIRONMENTAL SYSTEMS, 2015, 32 (1-2) : 100 - 118