An Architecture-Independent Instruction Shuffler to Protect against Side-Channel Attacks

被引:22
|
作者
Bayrak, Ali Galip [1 ]
Velickovic, Nikola [1 ]
Ienne, Paolo [1 ]
Burleson, Wayne [2 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[2] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
关键词
Design; Security; Performance; Side-channel attacks; instruction shuffler; random permutation generation; BIT PERMUTATIONS; DESIGN;
D O I
10.1145/2086696.2086699
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded cryptographic systems, such as smart cards, require secure implementations that are robust to a variety of low-level attacks. Side-Channel Attacks (SCA) exploit the information such as power consumption, electromagnetic radiation and acoustic leaking through the device to uncover the secret information. Attackers can mount successful attacks with very modest resources in a short time period. Therefore, many methods have been proposed to increase the security against SCA. Randomizing the execution order of the instructions that are independent, i.e., random shuffling, is one of the most popular among them. Implementing instruction shuffling in software is either implementation specific or has a significant performance or code size overhead. To overcome these problems, we propose in this work a generic custom hardware unit to implement random instruction shuffling as an extension to existing processors. The unit operates between the CPU and the instruction cache (or memory, if no cache exists), without any modification to these components. Both true and pseudo random number generators are used to dynamically and locally provide the shuffling sequence. The unit is mainly designed for in-order processors, since the embedded devices subject to these kind of attacks use simple in-order processors. More advanced processors (e.g., superscalar, VLIW or EPIC processors) are already more resistant to these attacks because of their built-in ILP and wide word size. Our experiments on two different soft in-order processor cores, i.e., OpenRISC and MicroBlaze, implemented on FPGA show that the proposed unit could increase the security drastically with very modest resource overhead. With around 2% area, 1.5% power and no performance overhead, the shuffler increases the effort to mount a successful power analysis attack on AES software implementation over 360 times.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] Improving side-channel attacks against pairing-based cryptography
    Damien Jauvart
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Journal of Cryptographic Engineering, 2020, 10 : 1 - 16
  • [32] Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
    Chen, Zhimin
    Sinha, Ambuj
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 124 - 136
  • [33] Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
    Korona, Mateusz
    Wojciechowski, Tomasz
    Rawski, Mariusz
    Tomaszewicz, Pawel
    PROCEEDINGS OF THE 2019 26TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2019), 2019, : 190 - 195
  • [34] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [35] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024, : 2 - 11
  • [36] A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber
    Xu, Dejun
    Wang, Kai
    Tian, Jing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2025, 72 (03) : 504 - 508
  • [37] Securing Applications against Side-channel Attacks through Resource Access Veto
    Osman, Tousif
    Mannan, Mohammad
    Hengartner, Urs
    Youssef, Amr
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (04):
  • [38] Anonymous CP-ABE Against Side-Channel Attacks in Cloud Computing
    Zhang, Jing-Xia
    Zhang, Le-You
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 789 - 805
  • [39] DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS
    Xiong, Sijie
    Sarwate, Anand D.
    Mandayam, Narayan B.
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2027 - 2031
  • [40] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98