Compiler-Assisted Threshold Implementation Against Power Analysis Attacks

被引:2
|
作者
Luo, Pei [1 ]
Athanasiou, Konstantinos [2 ]
Zhang, Liwei [3 ]
Jiang, Zhen Hang [1 ]
Fei, Yunsi [1 ]
Ding, A. Adam [3 ]
Wahl, Thomas [2 ]
机构
[1] Northeastern Univ, Dept Elect & Comp Engn, Boston, MA 02115 USA
[2] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
[3] Northeastern Univ, Dept Math, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICCD.2017.94
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attack utilizes side-channel leakages to extract the secret in crypto systems. Various countermeasures for different algorithms and platforms have been proposed to protect crypto systems against such attacks. Manual countermeasure design requires deep understanding of the target algorithm and implementation, and oftentimes is platform-specific and error-prone. In this paper, we propose the construction of Threshold Implementation (TI), a provably secure countermeasure against power attacks, as an automated compiler pass in the open LLVM (Low Level Virtual Machine) framework. Attack results show that the automatically generated TI designs are secure against power attacks. As our proposed scheme implements the countermeasure at the intermediate representation (IR) level, our method can be applied to any cipher software in any programming language, and the generated implementations can be ported to different platforms and architectures.
引用
收藏
页码:541 / 544
页数:4
相关论文
共 50 条
  • [1] Compiler-Assisted Loop Hardening Against Fault Attacks
    Proy, Julien
    Heydemann, Karine
    Berzati, Alexandre
    Cohen, Albert
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2017, 14 (04)
  • [2] Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks
    Winderix, Hans
    Muhlberg, Jan Tobias
    Piessens, Frank
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 667 - 682
  • [3] Compiler-assisted power optimization for clustered VLIW architectures
    Nagpal, Rahul
    Srikant, Y. N.
    PARALLEL COMPUTING, 2011, 37 (01) : 42 - 59
  • [4] COMPILER-ASSISTED FULL CHECKPOINTING
    LI, CCJ
    STEWART, EM
    FUCHS, WK
    SOFTWARE-PRACTICE & EXPERIENCE, 1994, 24 (10): : 871 - 886
  • [5] Compiler-assisted performance tuning
    Chen, Chun
    Chame, Jacqueline
    Nelson, Yoonju Lee
    Diniz, Pedro
    Hall, Mary
    Lucas, Robert
    SCIDAC 2007: SCIENTIFIC DISCOVERY THROUGH ADVANCED COMPUTING, 2007, 78
  • [6] Compiler-assisted Code Randomization
    Koo, Hyungjoon
    Chen, Yaohui
    Lu, Long
    Kemerlis, Vasileios P.
    Polychronakis, Michalis
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 461 - 477
  • [7] Compiler-assisted heterogeneous checkpointing
    Karablieh, F
    Bazzi, RA
    Hicks, M
    20TH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2001, : 56 - 65
  • [8] CALI: Compiler-Assisted Library Isolation
    Bauer, Markus
    Rossow, Christian
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 550 - 564
  • [9] Cache behavior analysis of a compiler-assisted cache replacement policy
    Tian, XY
    Zhao, KJ
    Chen, HW
    Du, HY
    ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, PROCEEDINGS, 2004, 3189 : 30 - 43
  • [10] Compiler-Assisted Object Inlining with Value Fields
    Bruno, Rodrigo
    Jovanovic, Vojin
    Wimmer, Christian
    Alonso, Gustavo
    PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21), 2021, : 128 - 141