Simulation models for side-channel information leaks

被引:0
|
作者
Tiri, K [1 ]
Verbauwhede, I [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90024 USA
关键词
simulation model; countermeasure; side-channel attack; differential power analysis; encryption; smart card; security IC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power consumption, execution time, electromagnetic radiation and other information that is leaked by the switching behavior of digital CMOS gates. Ever since power attacks have been introduced in 1999, many countermeasures have been proposed. Often a significant increase in security has been touted. We will show that in order to assess the effectiveness of a countermeasure, a correct simulation model of the side-channel information leaks is vital. We will show that seemingly correct approximations can lead to completely flawed results.
引用
收藏
页码:228 / 233
页数:6
相关论文
共 50 条
  • [41] An Information-Theoretic Model for Adaptive Side-Channel Attacks
    Koepf, Boris
    Basin, David
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 286 - 296
  • [42] Information theoretic evaluation of side-channel resistant logic styles
    Mace, Francois
    Standaert, Francois-Xavier
    Quisquater, Jean-Jacques
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 427 - +
  • [43] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
    Zhang, Zhenkai
    Zhan, Zihao
    Balasubramanian, Daniel
    Li, Bo
    Volgyesi, Peter
    Koutsoukos, Xenofon
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 729 - 746
  • [44] Attacking OpenSSL ECDSA with a small amount of side-channel information
    Wenbo Wang
    Shuqin Fan
    [J]. Science China Information Sciences, 2018, 61
  • [45] Optimal side-channel attacks for multivariate leakages and multiple models
    Bruneau N.
    Guilley S.
    Heuser A.
    Marion D.
    Rioul O.
    [J]. Journal of Cryptographic Engineering, 2017, 7 (4) : 331 - 341
  • [46] Poster Abstract: Context-Free Wearable Side-Channel Leaks Your Typing Privacy
    Liu, Yang
    Li, Zhenjiang
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018,
  • [47] Exposing Cache Timing Side-Channel Leaks through Out-of-Order Symbolic Execution
    Guo, Shengjian
    Chen, Yueqi
    Yu, Jiyong
    Wu, Meng
    Zuo, Zhiqiang
    Li, Peng
    Cheng, Yueqiang
    Wang, Huibo
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2020, 4 (04):
  • [48] My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack
    Gazzari, Matthias
    Mattmann, Annemarie
    Maass, Max
    Hollick, Matthias
    [J]. PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2021, 5 (04):
  • [49] Channel Simulation With Quantum Side Information
    Luo, Zhicheng
    Devetak, Igor
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (03) : 1331 - 1342
  • [50] CHANNEL SIMULATION AND CODING WITH SIDE INFORMATION
    STEINBERG, Y
    VERDU, S
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (03) : 634 - 646