Hiding Side-channel Leakage through Hardware Randomization: a Comprehensive Overview

被引:0
|
作者
Mentens, Nele [1 ]
机构
[1] Katholieke Univ Leuven, IMEC, COSIC, Kasteelpark Arenberg 10, B-3001 Leuven, Belgium
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper gives (i) an overview of the reconfiguration capabilities of modern hardware devices and (ii) a summary and comparison of hardware architectures that use random reconfiguration as a countermeasure against side-channel attacks. We categorize the architectures according to their suitability for specic hardware platforms. Further, we compare the reconfiguration methods and the attacks that the countermeasures protect against. Although the presented randomization countermeasures can usually be applied to a broad range of algorithms, evaluation results are presented for specific cryptographic algorithms. In most cases, randomization countermeasures can be combined with other countermeasures that are tailored to specific algorithms.
引用
下载
收藏
页码:269 / 272
页数:4
相关论文
共 50 条
  • [21] Side-Channel Analysis of Montgomery's Representation Randomization
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 212 - 227
  • [22] aLeak: Privacy Leakage through Context-Free Wearable Side-Channel
    Liu, Yang
    Li, Zhenjiang
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1232 - 1240
  • [23] Variation-Aware Hardware Trojan Detection through Power Side-channel
    Hossain, Fakir Sharif
    Shintani, Michihiro
    Inoue, Michiko
    Orailoglu, Alex
    2018 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2018,
  • [24] An exploration of effective fuzzing for side-channel cache leakage
    Basu, Tiyash
    Aggarwal, Kartik
    Wang, Chundong
    Chattopadhyay, Sudipta
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2020, 30 (01):
  • [25] How to explain side-channel leakage to your kids
    Naccache, D
    Tunstall, M
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 229 - 230
  • [26] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [27] Imitating Functional Operations for Mitigating Side-Channel Leakage
    Dhavlle, Abhijitt
    Rafatirad, Setareh
    Khasawneh, Khaled
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 868 - 881
  • [28] Evolvable Hardware Architectures on FPGA for Side-Channel Security
    Labafniya, Mansoureh
    Borujeni, Shahram Etemadi
    Mentens, Nele
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 163 - 180
  • [29] Constructive Side-Channel Analysis for Secure Hardware Design
    Herrmann, Alexander
    Stottinger, Marc
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 34 - 37
  • [30] Side-Channel Leakage Analysis of Inner Product Masking
    Li, Yuyuan
    Li, Lang
    Ou, Yu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 1245 - 1262