Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data

被引:3
作者
Seuschek, Hermann [1 ]
Rass, Stefan [2 ]
机构
[1] Tech Univ Munich, Inst Secur Informat Technol, D-80290 Munich, Germany
[2] Alpen Adria Univ Klagenfurt, Inst Appl Informat, Klagenfurt, Austria
来源
2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD) | 2015年
关键词
D O I
10.1109/DSD.2015.117
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Side-channel attacks are currently among the most serious threats for embedded systems. Popular countermeasures to mitigate the impact of such attacks are masking schemes, where secret intermediate values are split in two or more values by virtue of secret sharing. Processing the secret happens on separate execution paths, which are executed on the same central processing unit (CPU). In case of unwanted correlations between different registers inside the CPU the shared secret may leak out through a side-channel. This problem is particularly evident on low cost embedded systems, such as nodes for the Internet of Things (IoT), where cryptographic algorithms are often implemented in pure software on a reduced instruction set computer (RISC). On such an architecture, all data manipulation operations are carried out on the contents of the CPU's register file. This means that all intermediate values of the cryptographic algorithm at some stage pass through the register file. Towards avoiding unwanted correlations and leakages thereof, special care has to be taken in the mapping of the registers to intermediate values of the algorithm. In this work, we describe an empirical study that reveals effects of unintended unmasking of masked intermediate values and thus leaking secret values. The observed phenomena are related to the leakage of masked hardware implementations caused by glitches in the combinatorial path of the circuit but the effects are abstracted to the level of the instruction set architecture on a RISC CPU. Furthermore, we discuss countermeasures to have the compiler thwart such leakages.
引用
收藏
页码:423 / 430
页数:8
相关论文
共 50 条
[31]   Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs [J].
Ognjen Glamočanin ;
Shashwat Shrivastava ;
Jinwei Yao ;
Nour Ardo ;
Mathias Payer ;
Mirjana Stojilović .
Journal of Hardware and Systems Security, 2023, 7 (2-3) :72-99
[32]   Side-Channel Attack Analysis on In-Memory Computing Architectures [J].
Wang, Ziyu ;
Meng, Fan-Hsuan ;
Park, Yongmo ;
Eshraghian, Jason K. ;
Lu, Wei D. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (01) :109-121
[33]   Understanding Side-Channel Vulnerabilities in Superconducting Qubit Readout Architectures [J].
Maurya, Satvik ;
Mude, Chaithanya Naik ;
Lienhard, Benjamin ;
Tannu, Swamit .
2024 IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING, QCE, VOL 1, 2024, :1177-1183
[34]   Design of a Set of Software Tools for Side-Channel Attacks [J].
Fuentes, A. ;
Hernandez, L. ;
Martin, A. ;
Alarcos, B. .
IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (06) :1966-1978
[35]   Optimal strategies for side-channel leakage in FCFS packet schedulers [J].
Shintre, Saurabh ;
Gligor, Virgil ;
Barros, Joao .
2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, :2515-2519
[36]   Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers [J].
Seckiner, Soner ;
Kose, Selcuk .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) :2052-2063
[37]   Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations [J].
Schneider, Tobias ;
Moradi, Amir .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :495-513
[38]   Rassle: Return address stack based side-channel leakage [J].
Chakraborty, Anirban ;
Bhattacharya, Sarani ;
Alam, Manaar ;
Patranabis, Sikhar ;
Mukhopadhyay, Debdeep .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02) :275-303
[39]   Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks [J].
Xiao, Chong ;
Tang, Ming ;
Guilley, Sylvain .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
[40]   Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules [J].
Homma, Naofumi ;
Aoki, Takafumi ;
Satoh, Akashi .
2010 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC 2010), 2010, :97-102