A Survey of Side-Channel Leakage Assessment

被引:3
|
作者
Wang, Yaru [1 ,2 ]
Tang, Ming [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
leakage assessment technology; side channel attack; TVLA; leakage detection; POWER-ANALYSIS; COUNTERMEASURES; ATTACKS;
D O I
10.3390/electronics12163461
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more threatening side-channel attacks (SCAs) are being proposed, the security of cryptographic products is seriously challenged. This has prompted both academia and industry to evaluate the security of these products. The security assessment is divided into two styles: attacking-style assessment and leakage detection-style assessment. In this paper, we will focus specifically on the leakage detection-style assessment. Firstly, we divide the assessment methods into Test Vector Leakage Assessment (TVLA) and its optimizations and summarize the shortcomings of TVLA. Secondly, we categorize the various optimization schemes for overcoming these shortcomings into three groups: statistical tool optimizations, detection process optimizations, and decision strategy optimizations. We provide concise explanations of the motivations and processes behind each scheme, as well as compare their detection efficiency. Through our work, we conclude that there is no single optimal assessment scheme that can address all shortcomings of TVLA. Finally, we summarize the purposes and conditions of all leakage detection methods and provide a detection strategy for actual leakage detection. Additionally, we discuss the current development trends in leakage detection.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip
    Fujimoto, Daisuke
    Tanaka, Daichi
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yu-ichi
    Homma, Naofumi
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 32 - 37
  • [42] Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    2012 39TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2012, : 106 - 117
  • [43] A First Study of Compressive Sensing for Side-Channel Leakage Sampling
    Ou, Changhai
    Zhou, Chengju
    Lam, Siew-Kei
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (10) : 2166 - 2177
  • [44] Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition
    Guilley, Sylvain
    Heuser, Annelie
    Ming, Tang
    Rioul, Olivier
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 12 - 27
  • [45] Be My Guesses: The interplay between side-channel leakage metrics
    Beguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    MICROPROCESSORS AND MICROSYSTEMS, 2024, 107
  • [46] Pinpointing the side-channel leakage of masked AES hardware implementations
    Mangard, Stefan
    Schramm, Kai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 76 - 90
  • [47] A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
    Arora, Vipul
    Buhan, Ileana
    Perin, Guilherme
    Picek, Stjepan
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 80 - 96
  • [48] Side-Channel Leakage Amount Estimation Based on Communication Theory
    Yang, Wei
    Zhang, Hailong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [49] PSC-TG: RTL Power Side-Channel Leakage Assessment with Test Pattern Generation
    Zhang, Tao
    Park, Jungmin
    Tehranipoor, Mark
    Farahmandi, Farimah
    2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, : 709 - 714
  • [50] Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations
    Cobb, William E.
    Baldwin, Rusty O.
    Laspe, Eric D.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 16 (01)