ABBY: Automating leakage modelling for side-channel analysis

被引:0
|
作者
Bazangani, Omid [1 ]
Iooss, Alexandre [2 ]
Buhan, Ileana [1 ]
Batina, Lejla [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
[2] Inria Paris Rocquencourt, Rocquencourt, France
关键词
microarchitecture; side-channel simulator; deep learning; leakage model; POWER ANALYSIS;
D O I
10.1145/3634737.3637665
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mitigating side-channel leakage in cryptographic components is a vital concern for developers working with embedded devices. Conventional side-channel analysis demands substantial manual effort for setup preparation and trace recording, rendering it more intricate during the dynamic design phase, where software alterations occur frequently. Additionally, identifying the specific instruction(s) responsible for leakage has been hindered by limited hardware descriptions and restricted access to process technology information. We introduce ABBY, an open-source side-channel leakage profiling framework that targets the microarchitectural layer. Existing solutions to characterize the microarchitectural layer are devicespecific and/or require extensive manual effort. ABBY's main innovation is data collection, which can automatically characterize the microarchitectural behaviour of a target device and has the additional benefit of being extendable to other similar devices. Using ABBY, we created two datasets that capture the interaction of instructions for the ARM CORTEX-M0/M3 architecture. These sets are the first to capture detailed information on the microarchitectural layer. They can be used to explore various leakage models suitable for creating side-channel leakage simulators. A preliminary evaluation of a leakage model produced with our dataset of real-world cryptographic implementations shows performance comparable to state-of-the-art leakage simulators.
引用
下载
收藏
页码:231 / 244
页数:14
相关论文
共 50 条
  • [31] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [32] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [33] Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    2012 39TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2012, : 106 - 117
  • [34] EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
    Ding, Ruyi
    Cheng Gongye
    Wang, Siyue
    Ding, Aidong Adam
    Fei, Yunsi
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 300 - 313
  • [35] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [36] Comparison of side-channel leakage on Rich and Trusted Execution Environments
    Leignac, Paul
    Potin, Olivier
    Rigaud, Jean-Baptiste
    Dutertre, Jean-Max
    Pontie, Simon
    PROCEEDINGS OF THE SIXTH WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS CS2 2019, 2016, : 19 - 22
  • [37] Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
    Aydin, Furkan
    Aysu, Aydin
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 95 - 100
  • [38] Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip
    Fujimoto, Daisuke
    Tanaka, Daichi
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yu-ichi
    Homma, Naofumi
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 32 - 37
  • [39] A First Study of Compressive Sensing for Side-Channel Leakage Sampling
    Ou, Changhai
    Zhou, Chengju
    Lam, Siew-Kei
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (10) : 2166 - 2177
  • [40] Pinpointing the side-channel leakage of masked AES hardware implementations
    Mangard, Stefan
    Schramm, Kai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 76 - 90