Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers

被引:1
|
作者
Agosta, Giovanni [1 ]
Barenghi, Alessandro [1 ]
Pelosi, Gerardo [1 ]
Scandale, Michele [1 ]
机构
[1] Politecn Milan, DEIB, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy
关键词
Security; Side Channel Attacks; Software Countermeasures; Embedded Security;
D O I
10.1145/2744769.2744859
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A prominent threat to embedded systems security is represented by side-channel attacks: they have proven effective in breaching confidentiality, violating trust guarantees and IP protection schemes. State-of-the-art countermeasures reduce the leaked information to prevent the attacker from retrieving the secret key of the cipher. We propose an alternate defense strategy augmenting the regular information leakage with false targets, quite like chaff countermeasures against radars, hiding the correct secret key among a volley of chaff targets. This in turn feeds the attacker with a large amount of invalid keys, which can be used to trigger an alarm whenever the attack attempts a content forgery using them, thus providing a reactive security measure. We realized a LLVM compiler pass able to automatically apply the proposed countermeasure to software implementations of block ciphers. We provide effectiveness and efficiency results on an AES implementation running on an ARM Cortex-M4 showing performance overheads comparable with state-of-the-art countermeasures.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Wiretap channel with side information
    Chen, Yanling
    Vinck, A. J. Han
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 395 - 402
  • [32] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [33] The Poisson Channel with Side Information
    Bross, Shraga
    Lapidoth, Amos
    Wang, Ligong
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 574 - +
  • [34] Wiretap channel with side information
    Chen, Yanling
    Vinck, A. J. Han
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 2607 - +
  • [35] Evaluating side-channel information leakage in 3DES using the t-test
    Chen J.
    Li H.
    Wang Y.
    Wang Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2016, 56 (05): : 499 - 503
  • [36] DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage
    Yu, Honggang
    Ma, Haocheng
    Yang, Kaichen
    Zhao, Yiqiang
    Jin, Yier
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 209 - 218
  • [37] Side Channel Leakage Information Based on Electromagnetic Emission of STM32 Micro-controller
    Xu Zhijian
    Tang Qiang
    Song Yanyan
    Zhang Dongyao
    Zhou Changlin
    2019 12TH INTERNATIONAL WORKSHOP ON THE ELECTROMAGNETIC COMPATIBILITY OF INTEGRATED CIRCUITS (EMC COMPO 2019), 2019, : 204 - 206
  • [38] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Atici, Ali Can
    Yilmaz, Cemal
    Savas, Erkay
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84
  • [39] A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information
    Pammu, Ali Akbar
    Chong, Kwen-Siong
    Wang, Yi
    Gwee, Bah-Hwee
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 376 - 387
  • [40] Built-In Self-Test of SFQ Circuits Using Side-Channel Leakage Information
    Mustafa, Yerzhan
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (06) : 1100 - 1109