Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers

被引:1
|
作者
Agosta, Giovanni [1 ]
Barenghi, Alessandro [1 ]
Pelosi, Gerardo [1 ]
Scandale, Michele [1 ]
机构
[1] Politecn Milan, DEIB, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy
关键词
Security; Side Channel Attacks; Software Countermeasures; Embedded Security;
D O I
10.1145/2744769.2744859
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A prominent threat to embedded systems security is represented by side-channel attacks: they have proven effective in breaching confidentiality, violating trust guarantees and IP protection schemes. State-of-the-art countermeasures reduce the leaked information to prevent the attacker from retrieving the secret key of the cipher. We propose an alternate defense strategy augmenting the regular information leakage with false targets, quite like chaff countermeasures against radars, hiding the correct secret key among a volley of chaff targets. This in turn feeds the attacker with a large amount of invalid keys, which can be used to trigger an alarm whenever the attack attempts a content forgery using them, thus providing a reactive security measure. We realized a LLVM compiler pass able to automatically apply the proposed countermeasure to software implementations of block ciphers. We provide effectiveness and efficiency results on an AES implementation running on an ARM Cortex-M4 showing performance overheads comparable with state-of-the-art countermeasures.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] On red herrings and real herrings: disinformation and information in hydrological inference
    Beven, Keith
    Westerberg, Ida
    HYDROLOGICAL PROCESSES, 2011, 25 (10) : 1676 - 1680
  • [2] Information Theoretic Analysis of Side Channel Information Leakage in FCFS Schedulers
    Gong, Xun
    Kiyavash, Negar
    Venkitasubramaniam, Parv
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 1255 - 1259
  • [3] Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    2012 39TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2012, : 106 - 117
  • [4] On the Side Quantum—Classical Binary Channel of Information Leakage with Gaussian Noise
    S. N. Molotkov
    JETP Letters, 2020, 111 : 506 - 511
  • [5] Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers
    Seckiner, Soner
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) : 2052 - 2063
  • [6] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [7] Exploring Cortex-M Microarchitectural Side Channel Information Leakage
    Barenghi, Alessandro
    Breveglieri, Luca
    Izzo, Niccolo
    Pelosi, Gerardo
    IEEE ACCESS, 2021, 9 : 156507 - 156527
  • [8] Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    2010 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC 2010), 2010, : 97 - 102
  • [9] Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations
    Cobb, William E.
    Baldwin, Rusty O.
    Laspe, Eric D.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 16 (01)
  • [10] On the Detection of Adaptive Side-channel Attackers in Cloud Environments
    Alhulayyil, Hisham
    Khalil, Karim
    Krishnamurthy, Srikanth, V
    Cansever, Derya
    La Porta, Thomas
    Swami, Ananthram
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,