Defeating Simple Power Analysis Attacks in Cache Memories

被引:0
|
作者
Neagu, Madalin [1 ]
Miclea, Liviu [1 ]
Manich, Salvador [2 ]
机构
[1] Tech Univ Cluj Napoca, Cluj Napoca, Romania
[2] Univ Politecn Catalunya BarcelonaTech, Dept Elect Engn, Barcelona, Spain
关键词
Data scrambling; cache memories; cold-boot attack; self-healing memories; simple power analysis; side channel attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wide range of attacks that target cache memories in secure systems have been reported in the last half decade. Cold-boot attacks can be thwarted through the recently proposed Interleaved Scrambling Technique (IST). However, side channel attacks like the Simple Power Analysis (SPA) can still circumvent this protection. Error detection and correction codes (EDC/ECC) are employed in memories to increase reliability, but they can also be used to increase the security. This paper proposes to boost the IST with an ECC code in order to create a cache resistant against SPA-attacks. The redundancy provided by the ECC code is used to create confusion by enlarging the search space where the hacker has to look for to find the secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Page Cache Attacks
    Gruss, Daniel
    Kraft, Erik
    Tiwari, Trishita
    Schwarz, Michael
    Trachtenberg, Ari
    Hennessey, Jason
    Ionescu, Alex
    Fogh, Anders
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 167 - 180
  • [32] Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis
    Neagu, Madalin
    Manich, Salvador
    MICROELECTRONICS JOURNAL, 2017, 62 : 85 - 98
  • [33] Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform
    Shah, Pritam Gajkumar
    Ara, Tabassum
    Ambareen, Javeria
    Huang, Xu
    Hegde, Vinay V.
    2015 7TH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING & TECHNOLOGY (ICETET), 2015, : 51 - 55
  • [34] Defeating buffer overflow attacks via virtualization
    Tian, Donghai
    Xiong, Xi
    Hu, Changzhen
    Liu, Peng
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1940 - 1950
  • [35] Defeating Misclassification Attacks Against Transfer Learning
    Wu, Bang
    Wang, Shuo
    Yuan, Xingliang
    Wang, Cong
    Rudolph, Carsten
    Yang, Xiangwen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 886 - 901
  • [36] Defeating DoS attacks using wavelet aanalysis
    Heo, YJ
    Jang, JS
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 248 - 252
  • [37] Safe Machine Learning and Defeating Adversarial Attacks
    Rouhani, Bita Darvish
    Samragh, Mohammad
    Javidi, Tara
    Koushanfar, Farinaz
    IEEE SECURITY & PRIVACY, 2019, 17 (02) : 31 - 38
  • [38] ASYMPTOTIC ANALYSIS OF MEMORY INTERFERENCE IN MULTIPROCESSORS WITH PRIVATE CACHE MEMORIES
    KOGAN, YA
    BOGUSLAVSKY, LB
    PERFORMANCE EVALUATION, 1985, 5 (02) : 97 - 104
  • [39] Defeating Any Secret Cryptography with SCARE Attacks
    Guilley, Sylvain
    Sauvage, Laurent
    Micolod, Julien
    Real, Denis
    Valette, Frederic
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2010, 2010, 6212 : 273 - +
  • [40] Defeating Data Plane Attacks With Program Obfuscation
    Black, Conor
    Scott-Hayward, Sandra
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1317 - 1330