Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers

被引:1
|
作者
Agosta, Giovanni [1 ]
Barenghi, Alessandro [1 ]
Pelosi, Gerardo [1 ]
Scandale, Michele [1 ]
机构
[1] Politecn Milan, DEIB, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy
关键词
Security; Side Channel Attacks; Software Countermeasures; Embedded Security;
D O I
10.1145/2744769.2744859
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A prominent threat to embedded systems security is represented by side-channel attacks: they have proven effective in breaching confidentiality, violating trust guarantees and IP protection schemes. State-of-the-art countermeasures reduce the leaked information to prevent the attacker from retrieving the secret key of the cipher. We propose an alternate defense strategy augmenting the regular information leakage with false targets, quite like chaff countermeasures against radars, hiding the correct secret key among a volley of chaff targets. This in turn feeds the attacker with a large amount of invalid keys, which can be used to trigger an alarm whenever the attack attempts a content forgery using them, thus providing a reactive security measure. We realized a LLVM compiler pass able to automatically apply the proposed countermeasure to software implementations of block ciphers. We provide effectiveness and efficiency results on an AES implementation running on an ARM Cortex-M4 showing performance overheads comparable with state-of-the-art countermeasures.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [22] Univariate side channel attacks and leakage modeling
    Doget, Julien
    Prouff, Emmanuel
    Rivain, Matthieu
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) : 123 - 144
  • [23] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +
  • [24] Side-Channel Leakage across Borders
    Schmidt, Joern-Marc
    Plos, Thomas
    Kirschbaum, Mario
    Hutter, Michael
    Medwed, Marcel
    Herbst, Christoph
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
  • [25] A Survey of Side-Channel Leakage Assessment
    Wang, Yaru
    Tang, Ming
    ELECTRONICS, 2023, 12 (16)
  • [26] Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage
    Fujimoto, Daisuke
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yuichi
    Homma, Naofumi
    Aoki, Takafumi
    Hori, Yohei
    Katashita, Toshihiro
    Sakiyama, Kazuo
    Thanh-Ho Le
    Bringer, Julien
    Bazargan-Sabet, Pirouz
    Bhasin, Shivam
    Danger, Jean-Luc
    IEICE TRANSACTIONS ON ELECTRONICS, 2014, E97C (04): : 272 - 279
  • [27] Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage
    Cronin, Patrick
    Gao, Xing
    Yang, Chengmo
    Wang, Haining
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 681 - 698
  • [28] Thermal-aware 3D Design for Side-channel Information Leakage
    Gu, Peng
    Stow, Dylan
    Barnes, Russell
    Kursun, Eren
    Xie, Yuan
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 520 - 527
  • [29] Reducing Timing Side-Channel Information Leakage Using 3D Integration
    Bao, Chongxi
    Srivastava, Ankur
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 665 - 678
  • [30] A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture
    Zoni, Davide
    Barenghi, Alessandro
    Pelosi, Gerardo
    Fornaciari, William
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2018, 23 (05)