A Tale of Resilience: On the Practical Security of Masked Software Implementations

被引:0
|
作者
Casalino, Lorenzo [1 ]
Belleville, Nicolas [1 ]
Courousse, Damien [1 ]
Heydemann, Karine [2 ,3 ]
机构
[1] Univ Grenoble Alpes, CEA, List, F-38000 Grenoble, France
[2] Thales DIS, F-13590 Meyreuil, France
[3] Sorbonne Univ, CNRS, LIP6, F-75005 Paris, France
关键词
Security; Encoding; Resilience; Random variables; Registers; Side-channel attacks; Microarchitecture; Software engineering; Masking; processor micro-architecture; side-channel analysis; software masking;
D O I
10.1109/ACCESS.2023.3298436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. Furthermore, these techniques implicitly induce some form of parallelism, and the potential associated threat has never been investigated. In addition, the practical security of masking relies on the chosen masking scheme. Few works analysed the security of software protected by different masking schemes, and none considered the parallelism threat. Thus, literature lacks of a more comprehensive investigation on the practical security of software implementations relying on various masking schemes in presence of micro-architecture-induced recombination effects and parallelism. This work performs a first step to fill this gap. Specifically, we evaluate the practical security offered by first-order Boolean, arithmetic-sum and inner-product masking against transitions and parallelism in software. We firstly assess the presence of transition and parallel-based leakages in software. Secondly, we evaluate the security of the encodings of the selected masking schemes with respect to each leakage source via micro-benchmarks. Thirdly, we assess the practical security of different AES-128 software implementations, one for each selected masking scheme. We carry out the investigation on the STM32F215 and STM32F303 micro-controllers. We show that 1) CPU's parallel features allow successful attacks against masked implementations resistant to transition-based leakages; 2) implementation choices (e.g., finite field multiplication) impact on the practical security of masked software implementations in presence of recombination effects.
引用
收藏
页码:84651 / 84669
页数:19
相关论文
共 50 条
  • [21] Security implementations in the healthcare enterprise
    Brill, R
    Leetz, W
    CARS 2005: Computer Assisted Radiology and Surgery, 2005, 1281 : 290 - 295
  • [22] Practical Attacks on Masked Hardware
    Popp, Thomas
    Kirschbaum, Mario
    Mangard, Stefan
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 211 - +
  • [23] Constructing resilience through security and surveillance: The politics, practices and tensions of security-driven resilience
    Coaffee, Jon
    Fussey, Pete
    SECURITY DIALOGUE, 2015, 46 (01) : 86 - 105
  • [24] Domain-Oriented Masking Compact Masked Hardware Implementations with Arbitrary Protection Order
    Gross, Hannes
    Mangard, Stefan
    Korak, Thomas
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 3 - 3
  • [25] Efficient collision attacks on smart card implementations of masked AES
    WANG An
    WANG ZongYue
    ZHENG XueXin
    WANG XiaoMei
    CHEN Man
    ZHANG GuoShuang
    WU LiJi
    Science China(Information Sciences), 2015, 58 (05) : 97 - 111
  • [26] Efficient collision attacks on smart card implementations of masked AES
    Wang An
    Wang ZongYue
    Zheng XueXin
    Wang XiaoMei
    Chen Man
    Zhang GuoShuang
    Wu LiJi
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 15
  • [27] Revealing the weakness of addition chain based masked sbox implementations
    Ming J.
    Li H.
    Zhou Y.
    Cheng W.
    Qiao Z.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (04): : 326 - 350
  • [28] Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
    Gaspoz J.
    Dhooghe S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 155 - 179
  • [29] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)
  • [30] Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications
    Alvarenga, Eduardo
    Brands, Jan R.
    Doliwa, Peter
    den Hartog, Jerry
    Kraft, Erik
    Medwed, Marcel
    Nikov, Ventzislav
    Renes, Joost
    Rosso, Martin
    Schneider, Tobias
    Veshchikov, Nikita
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (02) : 583 - 600