Automatic Application of Power Analysis Countermeasures

被引:22
|
作者
Bayrak, Ali Galip [1 ]
Regazzoni, Francesco [2 ]
Novo, David [1 ]
Brisk, Philip [3 ]
Standaert, Francois-Xavier [4 ]
Ienne, Paolo [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[2] ALaRI Univ Lugano, CH-6900 Lugano, Switzerland
[3] Univ Calif Riverside, Dept Comp Sci & Engn, Riverside, CA 92521 USA
[4] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvain La Neuve, Belgium
关键词
Side-channel attacks; power analysis attacks; software countermeasures; compiler; DPA ATTACKS; DESIGN FLOW; RESISTANT; IMPLEMENTATIONS; FRAMEWORK; PROOF;
D O I
10.1109/TC.2013.219
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic algorithms against power-based side-channel attacks. The compiler first estimates which instruction instances leak the most information through side-channels. This information is obtained either by dynamic analysis, evaluating an information theoretic metric over the power traces acquired during the execution of the input program, or by static analysis. As information leakage implies a loss of security, the compiler then identifies (groups of) instruction instances to protect with a software countermeasure such as random precharging or Boolean masking. As software protection incurs significant overhead in terms of cryptosystem runtime and memory usage, the compiler protects the minimum number of instruction instances to achieve a desired level of security. The compiler is evaluated on two block ciphers, AES and Clefia; our experiments demonstrate that the compiler can automatically identify and protect the most important instruction instances. To date, these software countermeasures have been inserted manually by security experts, who are not necessarily the main cryptosystem developers. Our compiler offers significant productivity gains for cryptosystem developers who wish to protect their implementations from side-channel attacks.
引用
收藏
页码:329 / 341
页数:13
相关论文
共 50 条
  • [1] A First Step Towards Automatic Application of Power Analysis Countermeasures
    Bayrak, Ali Galip
    Regazzoni, Francesco
    Brisk, Philip
    Standaert, Francois-Xavier
    Ienne, Paolo
    [J]. PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 230 - 235
  • [2] Towards Automatic Application of Side Channel Countermeasures
    Regazzoni, Francesco
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 234 - 235
  • [3] Power analysis attacks and countermeasures
    Popp, Thomas
    Mangard, Stefan
    Oswald, Elisabeth
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543
  • [4] Research of differential power analysis countermeasures
    [J]. Wang, P.-J. (wangpengjun@nbu.edu.cn), 1600, Science Press (34):
  • [5] Power plants Automatic Voltage and Reactive Power Control System Application Analysis
    Gan, Zhi Yong
    Liu, Tao
    Wang, Yao
    [J]. 2012 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2012,
  • [6] Application of Automatic Differentiation in Power System Trajectory Sensitivity Analysis
    Geng, Guangchao
    Ajjarapu, Venkataramana
    Jiang, Quanyuan
    [J]. 2014 IEEE PES T&D CONFERENCE AND EXPOSITION, 2014,
  • [7] Investigations of power analysis attacks and countermeasures for ARIA
    Yoo, HyungSo
    Herbst, Christoph
    Mangard, Stefan
    Oswald, Elisabeth
    Moon, SangJae
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 160 - +
  • [8] Differential power analysis in the presence of hardware countermeasures
    Clavier, C
    Coron, JS
    Dabbous, N
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 252 - 263
  • [9] Differential Power Analysis Attack and Countermeasures on MCrypton
    Wang, Sixiang
    Cui, Qi
    Gao, Xianwei
    Zhang, Lei
    Duan, Xiaoyi
    [J]. PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 167 - 172
  • [10] Analysis and countermeasures of wind power curtailment in China
    Fan, Xiao-chao
    Wang, Wei-qing
    Shi, Rui-jing
    Li, Feng-ting
    [J]. RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2015, 52 : 1429 - 1436