Defeating Simple Power Analysis Attacks in Cache Memories

被引:0
|
作者
Neagu, Madalin [1 ]
Miclea, Liviu [1 ]
Manich, Salvador [2 ]
机构
[1] Tech Univ Cluj Napoca, Cluj Napoca, Romania
[2] Univ Politecn Catalunya BarcelonaTech, Dept Elect Engn, Barcelona, Spain
关键词
Data scrambling; cache memories; cold-boot attack; self-healing memories; simple power analysis; side channel attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wide range of attacks that target cache memories in secure systems have been reported in the last half decade. Cold-boot attacks can be thwarted through the recently proposed Interleaved Scrambling Technique (IST). However, side channel attacks like the Simple Power Analysis (SPA) can still circumvent this protection. Error detection and correction codes (EDC/ECC) are employed in memories to increase reliability, but they can also be used to increase the security. This paper proposes to boost the IST with an ECC code in order to create a cache resistant against SPA-attacks. The redundancy provided by the ECC code is used to create confusion by enlarging the search space where the hacker has to look for to find the secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] An efficient modular exponentiation algorithm against simple power analysis attacks
    Sun, Da-Zhi
    Huai, Jin-Peng
    Sun, Ji-Zhou
    Cao, Zhen-Fu
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2007, 53 (04) : 1718 - 1723
  • [22] Enhancing simple power-analysis attacks on elliptic curve cryptosystems
    Oswald, E
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 82 - 97
  • [23] Defeating distributed denial of service attacks
    Geng, Xianjun
    Whinston, Andrew B.
    IT Professional, 2000, 2 (04) : 36 - 41
  • [24] ANALYSIS OF MIN BASED MULTIPROCESSORS WITH PRIVATE CACHE MEMORIES
    BHUYAN, LN
    LIU, BC
    AHMED, I
    PROCEEDINGS OF THE 1989 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, VOL 1: ARCHITECTURE, 1989, : I51 - I58
  • [25] A WCET analysis method for pipelined microprocessors with cache memories
    Lundqvist, Thomas
    Doktorsavhandlingar vid Chalmers Tekniska Hogskola, 2002, (1864):
  • [26] A comparative analysis of performance improvement schemes for cache memories
    Kavi, Krishna
    Nwachukwu, Izuchukwu
    Fawibe, Ademola
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 243 - 257
  • [27] Value-conscious cache: Simple technique for reducing cache access power
    Chang, YJ
    Yang, CL
    Lai, F
    DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2004, : 16 - 21
  • [28] Using cache to reduce power in content-addressable memories (CAMs)
    Pagiamtzis, K
    Sheikholeslami, A
    CICC: PROCEEDINGS OF THE IEEE 2005 CUSTOM INTEGRATED CIRCUITS CONFERENCE, 2005, : 369 - 372
  • [29] Rigorous Analysis of Software Countermeasures against Cache Attacks
    Doychev, Goran
    Kopf, Boris
    ACM SIGPLAN NOTICES, 2017, 52 (06) : 406 - 421
  • [30] Boosting Profiled Cache Timing Attacks With A Priori Analysis
    Rebeiro, Chester
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1900 - 1905