A Survey of Side-Channel Leakage Assessment

被引:3
|
作者
Wang, Yaru [1 ,2 ]
Tang, Ming [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
leakage assessment technology; side channel attack; TVLA; leakage detection; POWER-ANALYSIS; COUNTERMEASURES; ATTACKS;
D O I
10.3390/electronics12163461
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more threatening side-channel attacks (SCAs) are being proposed, the security of cryptographic products is seriously challenged. This has prompted both academia and industry to evaluate the security of these products. The security assessment is divided into two styles: attacking-style assessment and leakage detection-style assessment. In this paper, we will focus specifically on the leakage detection-style assessment. Firstly, we divide the assessment methods into Test Vector Leakage Assessment (TVLA) and its optimizations and summarize the shortcomings of TVLA. Secondly, we categorize the various optimization schemes for overcoming these shortcomings into three groups: statistical tool optimizations, detection process optimizations, and decision strategy optimizations. We provide concise explanations of the motivations and processes behind each scheme, as well as compare their detection efficiency. Through our work, we conclude that there is no single optimal assessment scheme that can address all shortcomings of TVLA. Finally, we summarize the purposes and conditions of all leakage detection methods and provide a detection strategy for actual leakage detection. Additionally, we discuss the current development trends in leakage detection.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] ABBY: Automating leakage modelling for side-channel analysis
    Bazangani, Omid
    Iooss, Alexandre
    Buhan, Ileana
    Batina, Lejla
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 231 - 244
  • [22] Leverage the Average: Averaged Sampling in Pre-Silicon Side-Channel Leakage Assessment
    Kiaei, Pantea
    Liu, Zhenyuan
    Schaumont, Patrick
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 3 - 8
  • [23] Side-channel leakage assessment metrics and methodologies at design cycle: A case study for a cryptosystem
    Bokharaie, V. Samadi
    Jahanian, A.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [24] Side-Channel Leakage Detection Based on Constant Parameter Channel Model
    Yang, Wei
    Zhang, Hailong
    Gao, Yansong
    Fu, Anmin
    Wei, Songjie
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
  • [25] Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process
    Vahhab Samadi Bokharaie
    Ali Jahanian
    The Journal of Supercomputing, 2022, 78 : 2219 - 2244
  • [26] Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process
    Samadi Bokharaie, Vahhab
    Jahanian, Ali
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (02): : 2219 - 2244
  • [27] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [28] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296
  • [29] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [30] Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers
    Seckiner, Soner
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) : 2052 - 2063