Scramble Suit: A Profile Differentiation Countermeasure to Prevent Template Attacks

被引:11
作者
Barenghi, Alessandro [1 ]
Fornaciari, William [1 ]
Pelosi, Gerardo [1 ]
Zoni, Davide [1 ]
机构
[1] Politecn Milan, Dept Elect Informat & Bioengn, I-20133 Milan, Italy
基金
欧盟地平线“2020”;
关键词
Side-channel attacks; Performance evaluation; Computational modeling; Design automation; Hardware; Applied cryptography; embedded systems security; profiled attacks; side channel attacks (SCAs) countermeasures; CHANNEL; DESIGN; IMPLEMENTATION;
D O I
10.1109/TCAD.2019.2926389
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring protection against side channel attacks (SCAs) is a crucial requirement in the design of modern secure embedded systems. Profiled SCAs, the class to which template attacks and machine learning attacks belong, derive a model of the side channel behavior of a device identical to the target one, and exploit the said model to extract the key from the target, under the hypothesis that the side channel behaviors of the two devices match. We propose an architectural countermeasure against cross-device profiled attacks which differentiates the side channel behavior of different instances of the same hardware design, preventing the reuse of a model derived on a device other than the target one. In particular, we describe an instance of our solution providing a protected hardware implementation of the advanced encryption standard (AES) block cipher and experimentally validate its resistance against both Bayesian templates and machine learning approaches based on support vector machines also considering different state-of-the-art feature reduction techniques to increase the effectiveness of the profiled attacks. Results show that our countermeasure foils the key retrieval attempts via profiled attacks ensuring a key derivation accuracy equivalent to a random guess.
引用
收藏
页码:1778 / 1791
页数:14
相关论文
共 61 条
[1]   Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks [J].
Agosta, Giovanni ;
Barenghi, Alessandro ;
Pelosi, Gerardo .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) :1550-1554
[2]   Reactive side-channel countermeasures: Applicability and quantitative security evaluation [J].
Agosta, Giovanni ;
Barenghi, Alessandro ;
Pelosi, Gerardo ;
Scandale, Michele .
MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 :50-60
[3]   The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks [J].
Agosta, Giovanni ;
Barenghi, Alessandro ;
Pelosi, Gerardo ;
Scandale, Michele .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) :1320-1333
[4]   Design space extension for secure implementation of block ciphers [J].
Agosta, Giovanni ;
Barenghi, Alessandro ;
Maggi, Massimo ;
Pelosi, Gerardo .
IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06) :256-263
[5]  
Agosta G, 2012, DES AUT CON, P77
[6]   Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks [J].
Ambrose, J. A. ;
Ragel, R. G. ;
Parameswaran, S. ;
Ignjatovic, A. .
IET COMPUTERS AND DIGITAL TECHNIQUES, 2011, 5 (01) :1-15
[7]  
[Anonymous], 2015, POPULATION PYRAMIDS
[8]  
[Anonymous], 2020, IEEE EMBEDDED SYST L, DOI DOI 10.1109/LES.2019.2914136
[9]  
[Anonymous], 2014, P 51 ANN DES AUT C D, DOI DOI 10.1145/2593069.2593073
[10]  
[Anonymous], 2011, Principal component analysis International Encyclopedia of Statistical Science, DOI DOI 10.1007/978-3-642-04898-2_455