Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks

被引:3
|
作者
Kiaei, Pantea [1 ]
Mercadier, Darius [2 ]
Dagand, Pierre-Evariste [2 ]
Heydemann, Karine [2 ]
Schaumont, Patrick [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] LIP6, Paris, France
[3] Worcester Polytech Inst, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Side-channel leakage; Fault injection; Bitslice programming; POWER ANALYSIS; IMPLEMENTATION;
D O I
10.1007/978-3-030-68773-1_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing to the experimental dimension of this body of work, we propose a customized processor called SKIVA that supports experiments with the design of countermeasures against a broad range of implementation attacks. Based on bitslice programming and recent advances in the literature, SKIVA offers a flexible and modular combination of countermeasures against power-based and timing-based side-channel leakage and fault injection. Multiple configurations of side-channel protection and fault protection enable the programmer to select the desired number of shares and the desired redundancy level for each slice. Recurring and security-sensitive operations are supported in hardware through custom instruction-set extensions. The new instructions support bitslicing, secret-share generation, redundant logic computation, and fault detection. We demonstrate and analyze multiple versions of AES from a side-channel analysis and a fault-injection perspective, in addition to providing a detailed performance evaluation of the protected designs. To our knowledge, this is the first validated end-to-end implementation of a modular bitslice-oriented countermeasure.
引用
收藏
页码:221 / 253
页数:33
相关论文
共 50 条
  • [31] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [32] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    [J]. 2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [33] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [34] Side-channel attacks on smartcards
    NGS Software
    [J]. Netw. Secur., 2006, 12 (18-20):
  • [35] Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
    Ha, Guanxiong
    Chen, Hang
    Jia, Chunfu
    Li, Mingyue
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01) : 1 - 12
  • [36] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [37] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [38] Practical Side-Channel Attacks against WPA-TKIP
    Schepers, Domien
    Ranganathan, Aanjhan
    Vanhoef, Mathy
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 415 - 426
  • [39] A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
    Abdulgadir, Abubakr
    Mohajerani, Kamyar
    Dang, Viet Ba
    Kaps, Jens-Peter
    Gaj, Kris
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 224 - 245
  • [40] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03) : 471 - 475