Verifying and Quantifying Side-channel Resistance of Masked Software Implementations

被引:17
作者
Gao, Pengfei [1 ,3 ,4 ]
Zhang, Jun [1 ,3 ,4 ]
Song, Fu [1 ]
Wang, Chao [2 ]
机构
[1] ShanghaiTech Univ, 393 Middle Huaxia Rd, Shanghai 201210, Peoples R China
[2] Univ Southern Calif, 941 Bloom Walk Rd, Los Angeles, CA 90089 USA
[3] Univ Chinese Acad Sci, Beijing, Peoples R China
[4] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Beijing, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Differential power analysis; perfect masking; type inference; quantitative masking strength; satisfiability modulo theory (SMT); cryptographic software; AES; MAC-Keccak; HIGHER-ORDER MASKING; SECURE; AES;
D O I
10.1145/3330392
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Power side-channel attacks, capable of deducing secret data using statistical analysis, have become a serious threat. Random masking is a widely used countermeasure for removing the statistical dependence between secret data and side-channel information. Although there are techniques for verifying whether a piece of software code is perfectly masked, they are limited in accuracy and scalability. To bridge this gap, we propose a refinement-based method for verifying masking countermeasures. Our method is more accurate than prior type-inference-based approaches and more scalable than prior model-counting-based approaches using SAT or SMT solvers. Indeed, our method can be viewed as a gradual refinement of a set of type-inference rules for reasoning about distribution types. These rules are kept abstract initially to allow fast deduction and then made concrete when the abstract version is not able to resolve the verification problem. We also propose algorithms for quantifying the amount of side-channel information leakage from a software implementation using the notion of quantitative masking strength. We have implemented our method in a software tool and evaluated it on cryptographic benchmarks including AES and MAC-Keccak. The experimental results show that our method significantly outperforms state-of-the-art techniques in terms of accuracy and scalability.
引用
收藏
页数:32
相关论文
共 83 条
[1]  
Agosta G, 2012, DES AUT CON, P77
[2]  
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[3]  
[Anonymous], 2013, IACR Cryptol. ePrint Arch
[4]  
[Anonymous], 2007, Logic synthesis and verification algorithms
[5]  
[Anonymous], 2016, P IEEE S REAL TIM EM
[6]  
[Anonymous], 2014, P 3 INT C PRINC SEC
[7]  
[Anonymous], KECCAK IMPLEMENTATIO
[8]  
[Anonymous], 2014, P 20 INT C TOOLS ALG
[9]  
Antonopoulos T, 2017, ACM SIGPLAN NOTICES, V52, P362, DOI [10.1145/3062341.3062378, 10.1145/3140587.3062378]
[10]  
Arribas Victor, 2017, P IACR CRYPT EPRINT, P1227