Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks

被引:3
|
作者
Kiaei, Pantea [1 ]
Mercadier, Darius [2 ]
Dagand, Pierre-Evariste [2 ]
Heydemann, Karine [2 ]
Schaumont, Patrick [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] LIP6, Paris, France
[3] Worcester Polytech Inst, Worcester, MA 01609 USA
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020) | 2021年 / 12244卷
基金
美国国家科学基金会;
关键词
Side-channel leakage; Fault injection; Bitslice programming; POWER ANALYSIS; IMPLEMENTATION;
D O I
10.1007/978-3-030-68773-1_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing to the experimental dimension of this body of work, we propose a customized processor called SKIVA that supports experiments with the design of countermeasures against a broad range of implementation attacks. Based on bitslice programming and recent advances in the literature, SKIVA offers a flexible and modular combination of countermeasures against power-based and timing-based side-channel leakage and fault injection. Multiple configurations of side-channel protection and fault protection enable the programmer to select the desired number of shares and the desired redundancy level for each slice. Recurring and security-sensitive operations are supported in hardware through custom instruction-set extensions. The new instructions support bitslicing, secret-share generation, redundant logic computation, and fault detection. We demonstrate and analyze multiple versions of AES from a side-channel analysis and a fault-injection perspective, in addition to providing a detailed performance evaluation of the protected designs. To our knowledge, this is the first validated end-to-end implementation of a modular bitslice-oriented countermeasure.
引用
收藏
页码:221 / 253
页数:33
相关论文
共 50 条
  • [31] High-Level Synthesis for Side-Channel Defense
    Konigsmark, S. T. Choden
    Chen, Deming
    Wong, Martin D. F.
    2017 IEEE 28TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2017, : 37 - 44
  • [32] Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
    Unterluggauer, Thomas
    Mangard, Stefan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 3 - 18
  • [33] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [34] Combined Side-Channel Attacks on a Lightweight Prince Cipher Implementation
    Seckiner, Soner
    Kose, Selcuk
    34TH IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (SOCC), 2021, : 260 - 265
  • [35] Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC
    Abarzua, Rodrigo
    Valencia, Claudio
    Lopez, Julio
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) : 71 - 102
  • [36] Applications of machine learning techniques in side-channel attacks: a survey
    Benjamin Hettwer
    Stefan Gehrer
    Tim Güneysu
    Journal of Cryptographic Engineering, 2020, 10 : 135 - 162
  • [37] The Temperature Side Channel and Heating Fault Attacks
    Hutter, Michael
    Schmidt, Joern-Marc
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 219 - +
  • [38] Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios
    Carlet, Claude
    de Cherisey, Eloi
    Guilley, Sylvain
    Kavut, Selcuk
    Tang, Deng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 203 - 218
  • [39] Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 465 - 469
  • [40] Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
    Chen, Zhimin
    Sinha, Ambuj
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 124 - 136