Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks
نویسندگان
چکیده
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. proposed solutions adopt theoretical foundation (such as leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing experimental dimension this body work, we propose customized processor called SKIVA supports experiments with broad range implementation attacks. Based on bitslice programming advances literature, offers flexible modular combination power-based timing-based side-channel fault injection. Multiple configurations protection enable programmer select desired number shares redundancy level for each slice. Recurring security-sensitive operations are supported hardware through custom instruction-set extensions. new instructions support bitslicing, secret-share generation, redundant logic computation, detection. We demonstrate analyze multiple versions AES from analysis fault-injection perspective, addition providing detailed performance evaluation protected designs. To our knowledge, first validated end-to-end bitslice-oriented countermeasure.
منابع مشابه
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-preserving applications. In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks. The main obstacles towards secure RFID are the extreme constrai...
متن کاملDefense against Cache-based Side Channel Attacks for Secure Cloud Computing
Cloud computing is a combination of various established technologies like virtualization, dynamic elasticity, broad band Internet, etc. to provide configurable computer resources as a service to the users. Resources are shared among many distrusting clients by abstracting the underlying infrastructure using virtualization. While cloud computing has many practical benefits, resource sharing in c...
متن کاملDefend encryption systems against side- channel attacks
From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...
متن کاملProvably Secure Countermeasures against Side-channel Attacks
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak information about the secret key. In power analysis attacks, the observable leakage is the power consumption of the device, which is dependent on the processed data and the performed operations. Masking is a widely used countermeasure to thwart the powerful Differential Power Analysis (DPA) attacks. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-68773-1_11