Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data

被引:3
作者
Seuschek, Hermann [1 ]
Rass, Stefan [2 ]
机构
[1] Tech Univ Munich, Inst Secur Informat Technol, D-80290 Munich, Germany
[2] Alpen Adria Univ Klagenfurt, Inst Appl Informat, Klagenfurt, Austria
来源
2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD) | 2015年
关键词
D O I
10.1109/DSD.2015.117
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Side-channel attacks are currently among the most serious threats for embedded systems. Popular countermeasures to mitigate the impact of such attacks are masking schemes, where secret intermediate values are split in two or more values by virtue of secret sharing. Processing the secret happens on separate execution paths, which are executed on the same central processing unit (CPU). In case of unwanted correlations between different registers inside the CPU the shared secret may leak out through a side-channel. This problem is particularly evident on low cost embedded systems, such as nodes for the Internet of Things (IoT), where cryptographic algorithms are often implemented in pure software on a reduced instruction set computer (RISC). On such an architecture, all data manipulation operations are carried out on the contents of the CPU's register file. This means that all intermediate values of the cryptographic algorithm at some stage pass through the register file. Towards avoiding unwanted correlations and leakages thereof, special care has to be taken in the mapping of the registers to intermediate values of the algorithm. In this work, we describe an empirical study that reveals effects of unintended unmasking of masked intermediate values and thus leaking secret values. The observed phenomena are related to the leakage of masked hardware implementations caused by glitches in the combinatorial path of the circuit but the effects are abstracted to the level of the instruction set architecture on a RISC CPU. Furthermore, we discuss countermeasures to have the compiler thwart such leakages.
引用
收藏
页码:423 / 430
页数:8
相关论文
共 50 条
[21]   Imitating Functional Operations for Mitigating Side-Channel Leakage [J].
Dhavlle, Abhijitt ;
Rafatirad, Setareh ;
Khasawneh, Khaled ;
Homayoun, Houman ;
Dinakarrao, Sai Manoj Pudukotai .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) :868-881
[22]   Side-Channel Leakage Analysis of Inner Product Masking [J].
Li, Yuyuan ;
Li, Lang ;
Ou, Yu .
CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01) :1245-1262
[23]   Killing EM Side-Channel Leakage at its Source [J].
Das, Debayan ;
Nath, Mayukh ;
Ghosh, Santosh ;
Sen, Shreyas .
2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, :1108-1111
[24]   ABBY: Automating leakage modelling for side-channel analysis [J].
Bazangani, Omid ;
Iooss, Alexandre ;
Buhan, Ileana ;
Batina, Lejla .
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, :231-244
[25]   Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version [J].
Tamon Asano ;
Takeshi Sugawara .
Journal of Cryptographic Engineering, 2024, 14 :165-180
[26]   INVITED: Protecting RISC-V against Side-Channel Attacks [J].
De Mulder, Elke ;
Gummalla, Samatha ;
Hutter, Michael .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
[27]   Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version [J].
Asano, Tamon ;
Sugawara, Takeshi .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (01) :165-180
[28]   Side-Channel Leakage Detection Based on Constant Parameter Channel Model [J].
Yang, Wei ;
Zhang, Hailong ;
Gao, Yansong ;
Fu, Anmin ;
Wei, Songjie .
2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, :553-560
[29]   Efficient Side-Channel Data Compression Using Autoencoder Networks for Enhanced Leakage Analysis [J].
Yan, Mingkai ;
Zhang, Lixiong ;
Li, Yujia ;
Wu, Hanbing ;
Li, Yuran .
2024 IEEE 7TH INTERNATIONAL CONFERENCE ON AUTOMATION, ELECTRONICS AND ELECTRICAL ENGINEERING, AUTEEE, 2024, :304-308
[30]   Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers [J].
Chawla, Nikhil ;
Singh, Arvind ;
Rahman, Neel Mizanur ;
Kar, Monodeep ;
Mukhopadhyay, Saibal .
PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2019, :31-40