Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks

被引:3
|
作者
Kiaei, Pantea [1 ]
Mercadier, Darius [2 ]
Dagand, Pierre-Evariste [2 ]
Heydemann, Karine [2 ]
Schaumont, Patrick [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] LIP6, Paris, France
[3] Worcester Polytech Inst, Worcester, MA 01609 USA
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020) | 2021年 / 12244卷
基金
美国国家科学基金会;
关键词
Side-channel leakage; Fault injection; Bitslice programming; POWER ANALYSIS; IMPLEMENTATION;
D O I
10.1007/978-3-030-68773-1_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing to the experimental dimension of this body of work, we propose a customized processor called SKIVA that supports experiments with the design of countermeasures against a broad range of implementation attacks. Based on bitslice programming and recent advances in the literature, SKIVA offers a flexible and modular combination of countermeasures against power-based and timing-based side-channel leakage and fault injection. Multiple configurations of side-channel protection and fault protection enable the programmer to select the desired number of shares and the desired redundancy level for each slice. Recurring and security-sensitive operations are supported in hardware through custom instruction-set extensions. The new instructions support bitslicing, secret-share generation, redundant logic computation, and fault detection. We demonstrate and analyze multiple versions of AES from a side-channel analysis and a fault-injection perspective, in addition to providing a detailed performance evaluation of the protected designs. To our knowledge, this is the first validated end-to-end implementation of a modular bitslice-oriented countermeasure.
引用
收藏
页码:221 / 253
页数:33
相关论文
共 50 条
  • [41] First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
    Prouff, Emmanuel
    McEvoy, Robert
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 81 - 96
  • [42] How Diversity Affects Deep-Learning Side-Channel Attacks
    Wang, Huanyu
    Brisfors, Martin
    Forsmark, Sebastian
    Dubrova, Elena
    2019 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS) - NORCHIP AND INTERNATIONAL SYMPOSIUM OF SYSTEM-ON-CHIP (SOC), 2019,
  • [43] Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations
    Jarvinen, Kimmo
    Balasch, Josep
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2016, 2017, 10146 : 137 - 155
  • [44] Thwarting code-reuse and side-channel attacks in embedded systems
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panagiotis
    COMPUTERS & SECURITY, 2023, 133
  • [45] Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study
    Nawaz, Kashif
    Kamel, Dinal
    Standaert, Francois-Xavier
    Flandre, Denis
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 19 - 33
  • [46] Side-Channel Attack against RSA Key Generation Algorithms
    Bauer, Aurelie
    Jaulmes, Eliane
    Lomne, Victor
    Prouff, Emmanuel
    Roche, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 223 - 241
  • [47] A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks
    Li, Yang
    Wang, Shuang
    Wang, Zhibin
    Wang, Jian
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 51 - 69
  • [48] Multi-Source Training Deep-Learning Side-Channel Attacks
    Wang, Huanyu
    Forsmark, Sebastian
    Brisfors, Martin
    Dubrova, Elena
    2020 IEEE 50TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2020), 2020, : 58 - 63
  • [49] Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder
    Hu, Fanliang
    Shen, Jian
    Vijayakumar, Pandi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2051 - 2065
  • [50] Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks
    van den Berg, Danny
    Slooff, Tom
    Brohet, Marco
    Papagiannopoulos, Kostas
    Regazzoni, Francesco
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,