Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers

被引:1
|
作者
Agosta, Giovanni [1 ]
Barenghi, Alessandro [1 ]
Pelosi, Gerardo [1 ]
Scandale, Michele [1 ]
机构
[1] Politecn Milan, DEIB, Piazza Leonardo da Vinci 32, I-20133 Milan, Italy
关键词
Security; Side Channel Attacks; Software Countermeasures; Embedded Security;
D O I
10.1145/2744769.2744859
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A prominent threat to embedded systems security is represented by side-channel attacks: they have proven effective in breaching confidentiality, violating trust guarantees and IP protection schemes. State-of-the-art countermeasures reduce the leaked information to prevent the attacker from retrieving the secret key of the cipher. We propose an alternate defense strategy augmenting the regular information leakage with false targets, quite like chaff countermeasures against radars, hiding the correct secret key among a volley of chaff targets. This in turn feeds the attacker with a large amount of invalid keys, which can be used to trigger an alarm whenever the attack attempts a content forgery using them, thus providing a reactive security measure. We realized a LLVM compiler pass able to automatically apply the proposed countermeasure to software implementations of block ciphers. We provide effectiveness and efficiency results on an AES implementation running on an ARM Cortex-M4 showing performance overheads comparable with state-of-the-art countermeasures.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Distance Based Leakage Alignment for Side Channel Attacks
    Yang, Wei
    Cao, Yuchen
    Zhou, Yongbin
    Zhang, Hailong
    Zhang, Qian
    IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (04) : 419 - 423
  • [42] Side-channel leakage of masked CMOS gates
    Mangard, S
    Popp, T
    Gammel, BM
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 351 - 365
  • [43] Authenticated Encryption in the Face of Protocol and Side Channel Leakage
    Barwell, Guy
    Martin, Daniel P.
    Oswald, Elisabeth
    Stam, Martijn
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 693 - 723
  • [44] Evaluating the ROCKY Countermeasure for Side-Channel Leakage
    Miteloudi, Konstantina
    Chmielewski, Lukasz
    Batina, Lejla
    Mentens, Nele
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 212 - 217
  • [45] FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage
    Farhang, Sadegh
    Grossklags, Jens
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 195 - 214
  • [46] INFORMATION LEAKAGE THROUGH A PASSIVE OPTICAL CHANNEL
    YU, FTS
    TAI, A
    JOURNAL OF THE OPTICAL SOCIETY OF AMERICA, 1974, 64 (04) : 560 - 560
  • [47] INFORMATION LEAKAGE THROUGH A PASSIVE OPTICAL CHANNEL
    YU, FTS
    TAI, A
    OPTICS COMMUNICATIONS, 1975, 14 (01) : 51 - 55
  • [48] The wireless opaque channel to contrast information leakage
    Aime, MD
    Atzeni, A
    Lioy, A
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 570 - 575
  • [49] Side-Channel Leakage Detection Based on Constant Parameter Channel Model
    Yang, Wei
    Zhang, Hailong
    Gao, Yansong
    Fu, Anmin
    Wei, Songjie
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
  • [50] Channel Simulation With Quantum Side Information
    Luo, Zhicheng
    Devetak, Igor
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (03) : 1331 - 1342