Defeating Simple Power Analysis Attacks in Cache Memories

被引:0
|
作者
Neagu, Madalin [1 ]
Miclea, Liviu [1 ]
Manich, Salvador [2 ]
机构
[1] Tech Univ Cluj Napoca, Cluj Napoca, Romania
[2] Univ Politecn Catalunya BarcelonaTech, Dept Elect Engn, Barcelona, Spain
关键词
Data scrambling; cache memories; cold-boot attack; self-healing memories; simple power analysis; side channel attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wide range of attacks that target cache memories in secure systems have been reported in the last half decade. Cold-boot attacks can be thwarted through the recently proposed Interleaved Scrambling Technique (IST). However, side channel attacks like the Simple Power Analysis (SPA) can still circumvent this protection. Error detection and correction codes (EDC/ECC) are employed in memories to increase reliability, but they can also be used to increase the security. This paper proposes to boost the IST with an ECC code in order to create a cache resistant against SPA-attacks. The redundancy provided by the ECC code is used to create confusion by enlarging the search space where the hacker has to look for to find the secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Defeating simple power analysis on Koblitz curves
    Vuillaume, Camille
    Okeya, Katsuyuki
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1362 - 1369
  • [2] Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
    Giner, Lukas
    Steinegger, Stefan
    Purnal, Antoon
    Eichlseder, Maria
    Unterluggauer, Thomas
    Mangard, Stefan
    Gruss, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2273 - 2287
  • [3] Cache based power analysis attacks on AES
    Fournier, Jacques
    Tunstall, Michael
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 17 - 28
  • [4] PERFORMANCE ANALYSIS OF CACHE MEMORIES
    RAO, GS
    JOURNAL OF THE ACM, 1978, 25 (03) : 378 - 395
  • [5] CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing
    Liu, Fangfei
    Ge, Qian
    Yarom, Yuval
    Mckeen, Frank
    Rozas, Carlos
    Heiser, Gernot
    Lee, Ruby B.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA-22), 2016, : 406 - 418
  • [6] ANALYSIS OF MULTIPROCESSORS WITH PRIVATE CACHE MEMORIES
    PATEL, JH
    IEEE TRANSACTIONS ON COMPUTERS, 1982, 31 (04) : 296 - 304
  • [7] A parallelization of ECDSA resistant to simple power analysis attacks
    Aravamuthan, Sarang
    Thumparthy, Viswanatha Rao
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 247 - +
  • [8] Probabilistic Analysis of Cache Memories and Cache Memories Impacts on Multi-core Embedded Systems
    Guet, Fabrice
    Santinelli, Luca
    Morio, Jerome
    2016 11TH IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES), 2016,
  • [9] Leakage power proliferation in short channel cache memories
    Mohamed, N.
    Botros, N.
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 349 - 352
  • [10] Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
    Gras, Ben
    Razavi, Kaveh
    Bos, Herbert
    Giuffrida, Cristiano
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 955 - 972