A Tale of Resilience: On the Practical Security of Masked Software Implementations

被引:0
作者
Casalino, Lorenzo [1 ]
Belleville, Nicolas [1 ]
Courousse, Damien [1 ]
Heydemann, Karine [2 ,3 ]
机构
[1] Univ Grenoble Alpes, CEA, List, F-38000 Grenoble, France
[2] Thales DIS, F-13590 Meyreuil, France
[3] Sorbonne Univ, CNRS, LIP6, F-75005 Paris, France
关键词
Security; Encoding; Resilience; Random variables; Registers; Side-channel attacks; Microarchitecture; Software engineering; Masking; processor micro-architecture; side-channel analysis; software masking;
D O I
10.1109/ACCESS.2023.3298436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. Furthermore, these techniques implicitly induce some form of parallelism, and the potential associated threat has never been investigated. In addition, the practical security of masking relies on the chosen masking scheme. Few works analysed the security of software protected by different masking schemes, and none considered the parallelism threat. Thus, literature lacks of a more comprehensive investigation on the practical security of software implementations relying on various masking schemes in presence of micro-architecture-induced recombination effects and parallelism. This work performs a first step to fill this gap. Specifically, we evaluate the practical security offered by first-order Boolean, arithmetic-sum and inner-product masking against transitions and parallelism in software. We firstly assess the presence of transition and parallel-based leakages in software. Secondly, we evaluate the security of the encodings of the selected masking schemes with respect to each leakage source via micro-benchmarks. Thirdly, we assess the practical security of different AES-128 software implementations, one for each selected masking scheme. We carry out the investigation on the STM32F215 and STM32F303 micro-controllers. We show that 1) CPU's parallel features allow successful attacks against masked implementations resistant to transition-based leakages; 2) implementation choices (e.g., finite field multiplication) impact on the practical security of masked software implementations in presence of recombination effects.
引用
收藏
页码:84651 / 84669
页数:19
相关论文
共 50 条
  • [41] The promise of security: resilience, surprise and epistemic politics
    Aradau, Claudia
    RESILIENCE-INTERNATIONAL POLICIES PRACTICES AND DISCOURSES, 2014, 2 (02): : 73 - 87
  • [42] Information systems security resilience as a dynamic capability
    Goel, Lakshmi
    Russell, Dawn
    Williamson, Steven
    Zhang, Justin Zuopeng
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2023, 36 (04) : 906 - 924
  • [43] Security by Design: Rethinking Resilience of IoT in Healthcare
    Moganedi, Sophia
    Dlamini, Sifiso
    2021 IST-AFRICA CONFERENCE (IST-AFRICA), 2021,
  • [44] Privacy, security and resilience in mobile healthcare applications
    Lin, Wenjun
    Xu, Ming
    He, Jingyi
    Zhang, Wenjun
    ENTERPRISE INFORMATION SYSTEMS, 2023, 17 (03)
  • [45] Impact of Noise on the Resilience and the Security of Quantum Computing
    Saki, Abdullah Ash
    Alam, Mahabubul
    Ghosh, Swaroop
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 186 - 191
  • [46] A Survey and Tutorial on Security and Resilience of Quantum Computing
    Saki, Abdullah Ash
    Alam, Mahabubul
    Phalak, Koustubh
    Suresh, Aakarshitha
    Topaloglu, Rasit Onur
    Ghosh, Swaroop
    2021 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2021), 2021,
  • [47] Is resilience a useful concept in the context of food security and nutrition programmes? Some conceptual and practical considerations
    Bene, Christophe
    Headey, Derek
    Haddad, Lawrence
    von Grebmer, Klaus
    FOOD SECURITY, 2016, 8 (01) : 123 - 138
  • [48] Is resilience a useful concept in the context of food security and nutrition programmes? Some conceptual and practical considerations
    Christophe Béné
    Derek Headey
    Lawrence Haddad
    Klaus von Grebmer
    Food Security, 2016, 8 : 123 - 138
  • [49] PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
    Zeitschner, Jannik
    Moradi, Amir
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 342 - 376
  • [50] Human Aspects and Security in Software Development
    Staron, Miroslaw
    Abrahao, Silvia
    Penzenstaler, Birgit
    Serebrenik, Alexander
    IEEE SOFTWARE, 2024, 41 (04) : 171 - 174