Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks

被引:3
|
作者
Kiaei, Pantea [1 ]
Mercadier, Darius [2 ]
Dagand, Pierre-Evariste [2 ]
Heydemann, Karine [2 ]
Schaumont, Patrick [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] LIP6, Paris, France
[3] Worcester Polytech Inst, Worcester, MA 01609 USA
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020) | 2021年 / 12244卷
基金
美国国家科学基金会;
关键词
Side-channel leakage; Fault injection; Bitslice programming; POWER ANALYSIS; IMPLEMENTATION;
D O I
10.1007/978-3-030-68773-1_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing to the experimental dimension of this body of work, we propose a customized processor called SKIVA that supports experiments with the design of countermeasures against a broad range of implementation attacks. Based on bitslice programming and recent advances in the literature, SKIVA offers a flexible and modular combination of countermeasures against power-based and timing-based side-channel leakage and fault injection. Multiple configurations of side-channel protection and fault protection enable the programmer to select the desired number of shares and the desired redundancy level for each slice. Recurring and security-sensitive operations are supported in hardware through custom instruction-set extensions. The new instructions support bitslicing, secret-share generation, redundant logic computation, and fault detection. We demonstrate and analyze multiple versions of AES from a side-channel analysis and a fault-injection perspective, in addition to providing a detailed performance evaluation of the protected designs. To our knowledge, this is the first validated end-to-end implementation of a modular bitslice-oriented countermeasure.
引用
收藏
页码:221 / 253
页数:33
相关论文
共 50 条
  • [21] Side-Channel Attacks on Fingerprint Matching Algorithms
    Duermuth, Markus
    Oswald, David
    Pastewka, Niklas
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 3 - 13
  • [22] Scan attacks on side-channel and fault attack resistant public-key implementations
    Jean Da Rolt
    Amitabh Das
    Santosh Ghosh
    Giorgio Di Natale
    Marie-Lise Flottes
    Bruno Rouzeyre
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2012, 2 (4) : 207 - 219
  • [23] Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher
    POTESTAD-ORDONEZ, F. E.
    TENA-SANCHEZ, E.
    ACOSTA-JIMENEZ, A. J.
    JIMENEZ-FERNANDEZ, C. J.
    CHAVES, R. I. C. A. R. D. O.
    IEEE ACCESS, 2022, 10 : 65548 - 65561
  • [24] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219
  • [25] A statistical verification method of random permutations for hiding countermeasure against side-channel attacks
    Park, Jong-Yeon
    Ju, Jang-Won
    Lee, Wonil
    Kang, Bo Gyeong
    Kachi, Yasuyuki
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [26] CASCA: A Design Automation Approach for Designing Hardware Countermeasures Against Side-Channel Attacks
    Delledonne, Lorenzo
    Zaccaria, Vittorio
    Susella, Ruggero
    Bertoni, Guido
    Melzani, Filippo
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2018, 23 (06)
  • [27] Protecting CRT RSA against Fault and Power Side Channel Attacks
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    2012 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2012, : 159 - 164
  • [28] Statistical Tools Flavor Side-Channel Collision Attacks
    Moradi, Amir
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 428 - 445
  • [29] Adaptive Chosen-Message Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Standaert, Francois-Xavier
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 186 - 199
  • [30] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)