Distance Based Leakage Alignment for Side Channel Attacks

被引:7
|
作者
Yang, Wei [1 ,2 ]
Cao, Yuchen [1 ,2 ]
Zhou, Yongbin [1 ]
Zhang, Hailong [1 ]
Zhang, Qian [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Alignment; anti-noise performance; shotgun distance; side channel attacks; weighted edit distance; SIGNAL;
D O I
10.1109/LSP.2016.2521441
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Side Channel Attack (SCA) recovers secret information from an embedded device with implementation of cryptographic algorithm by exploiting its physical leakages. For most SCA methods to achieve good performance, the measured leakages are often desired to be well aligned. However, due to some specific reasons such as inaccurate measurements or carefully designed countermeasures, misalignment of leakages frequently occurs in practice. Misalignment significantly reduces the efficiency of SCA methods, or even makes them fail. To address this issue, two alignment approaches are proposed: a local alignment based on shotgun distance and a global alignment based on weighted edit distance. Compared with previous methods, the proposed methods are capable of keeping the secret dependant leakages, while not introducing any redundant information. In addition, the proposed methods could also reduce the negative effects of noise, which is another factor seriously decreasing the efficiency of SCA methods. Interestingly, it is pretty easy to set appropriate parameters for these two methods. Practical experiments show that the proposed methods outperform previous methods in three different circumstances and different noise levels.
引用
收藏
页码:419 / 423
页数:5
相关论文
共 50 条
  • [1] Side Channel Leakage Alignment Based on Longest Common Subsequence
    Jia, Anni
    Yang, Wei
    Zhang, Gongxuan
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 130 - 137
  • [2] Univariate side channel attacks and leakage modeling
    Doget, Julien
    Prouff, Emmanuel
    Rivain, Matthieu
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) : 123 - 144
  • [3] Towards Efficient Alignment for Electromagnetic Side Channel Attacks
    Abdellatif, Karim M.
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 118 - 121
  • [4] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [5] Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE ACCESS, 2019, 7 : 19041 - 19053
  • [6] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [7] Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks
    Xiao, Chong
    Tang, Ming
    Guilley, Sylvain
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [8] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Atici, Ali Can
    Yilmaz, Cemal
    Savas, Erkay
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84
  • [9] Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
    Backes, Michael
    Koepf, Boris
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 517 - +
  • [10] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151