Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations

被引:24
|
作者
Bronchain, Olivier [1 ]
Hendrickx, Julien M. [1 ]
Massart, Clement [1 ]
Olshevsky, Alex [2 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Catholic Univ Louvain, ICTEAM Inst, Louvain La Neuve, Belgium
[2] Boston Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
来源
基金
欧盟地平线“2020”;
关键词
POWER ANALYSIS; ENTROPY;
D O I
10.1007/978-3-030-26948-7_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage certification aims at guaranteeing that the statistical models used in side-channel security evaluations are close to the true statistical distribution of the leakages, hence can be used to approximate a worst-case security level. Previous works in this direction were only qualitative: for a given amount of measurements available to an evaluation laboratory, they rated a model as "good enough" if the model assumption errors (i.e., the errors due to an incorrect choice of model family) were small with respect to the model estimation errors. We revisit this problem by providing the first quantitative tools for leakage certification. For this purpose, we provide bounds for the (unknown) Mutual Information metric that corresponds to the true statistical distribution of the leakages based on two easy-to-compute information theoretic quantities: the Perceived Information, which is the amount of information that can be extracted from a leaking device thanks to an estimated statistical model, possibly biased due to estimation and assumption errors, and the Hypothetical Information, which is the amount of information that would be extracted from an hypothetical device exactly following the model distribution. This positive outcome derives from the observation that while the estimation of the Mutual Information is in general a hard problem (i.e., estimators are biased and their convergence is distribution-dependent), it is significantly simplified in the case of statistical inference attacks where a target random variable (e.g., a key in a cryptographic setting) has a constant (e.g., uniform) probability. Our results therefore provide a general and principled path to bound the worst-case security level of an implementation. They also significantly speed up the evaluation of any profiled side-channel attack, since they imply that the estimation of the Perceived Information, which embeds an expensive cross-validation step, can be bounded by the computation of a cheaper Hypothetical Information, for any estimated statistical model.
引用
收藏
页码:713 / 737
页数:25
相关论文
共 50 条
  • [1] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [2] Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
    Backes, Michael
    Koepf, Boris
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 517 - +
  • [3] A Frequency-based Leakage Assessment Methodology for Side-Channel Evaluations
    Lei, Wan
    Wang, Lihui
    Shan, Weijun
    Jiang, Kun
    Li, Qing
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 590 - 593
  • [4] Side-channel countermeasures’ dissection and the limits of closed source security evaluations
    Bronchain O.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 1 - 25
  • [5] Side-Channel Leakage Detection Based on Constant Parameter Channel Model
    Yang, Wei
    Zhang, Hailong
    Gao, Yansong
    Fu, Anmin
    Wei, Songjie
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
  • [6] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [7] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [8] A Survey of Side-Channel Leakage Assessment
    Wang, Yaru
    Tang, Ming
    ELECTRONICS, 2023, 12 (16)
  • [9] Side-Channel Leakage across Borders
    Schmidt, Joern-Marc
    Plos, Thomas
    Kirschbaum, Mario
    Hutter, Michael
    Medwed, Marcel
    Herbst, Christoph
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
  • [10] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +