A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks

被引:0
|
作者
Oren, Yossef [1 ]
Weisse, Ofir [2 ]
Wool, Avishai [3 ]
机构
[1] Columbia Univ, Network Secur Lab, New York, NY 10027 USA
[2] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
[3] Tel Aviv Univ, Sch Elect Engn, Tel Aviv, Israel
关键词
Constraint solvers; power analysis; template attacks; EXPERTS; AES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of constraint solvers, such as SAT-or Pseudo-Boolean-solvers, allows the extraction of the secret key from one or two side-channel traces. However, to use such a solver the cipher must be represented at bit-level. For byte-oriented ciphers this produces very large and unwieldy instances, leading to unpredictable, and often very long, run times. In this paper we describe a specialized byte-oriented constraint solver for side channel cryptanalysis. The user only needs to supply code snippets for the native operations of the cipher, arranged in a flow graph that models the dependence between the side channel leaks. Our framework uses a soft decision mechanism which overcomes realistic measurement noise and decoder classification errors, through a novel method for reconciling multiple probability distributions. On the DPA v4 contest dataset our framework is able to extract the correct key from one or two power traces in under 9 seconds with a success rate of over 79%.
引用
收藏
页码:17 / 34
页数:18
相关论文
共 50 条
  • [31] Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems
    Novakovic, Chris
    Parker, David
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 319 - 337
  • [32] Understanding the Urhobo Tonal Structure through Constraint-Based Framework
    Utulu, Don Chukwuemeka
    Ajiboye, Emuobonuvie Maria
    Edojaimoni, Irene Eloho
    RUPKATHA JOURNAL ON INTERDISCIPLINARY STUDIES IN HUMANITIES, 2023, 15 (02):
  • [33] A Constraint-based Framework for Incorporating A Priori Knowledge into Fuzzy Modelling
    Lai, K. Robert
    Chiang, Yi-Yuan
    2008 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2008, : 1813 - +
  • [34] Towards a constraint-based engineering framework for algorithm design and application
    Kasif, Simon
    Constraints, 1997, 2 (01): : 75 - 82
  • [35] Towards a constraint-based engineering framework for algorithm design and application
    Kasif Simon
    Constraints, 1997, 2 (1) : 75 - 82
  • [36] Euclide: A Constraint-Based Testing framework for critical C programs
    Gotlieb, Arnaud
    SECOND INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION, AND VALIDATION, PROCEEDINGS, 2009, : 151 - 160
  • [37] A framework to support multiple views in geometric constraint-based models
    Joan-Arinyo, R
    Soto, A
    Vila, S
    Vilaplana, J
    ETFA 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PROCEEDINGS, 2001, : 575 - 579
  • [38] Confidence Interval Constraint-Based Regularization Framework for PET Quantization
    Kucharczak, F.
    Ben Bouallegue, F.
    Strauss, O.
    Mariano-Goulart, D.
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2019, 38 (06) : 1513 - 1523
  • [39] Satisfiability-based framework for enabling side-channel attacks on cryptographic software
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    2006 DESIGN AUTOMATION AND TEST IN EUROPE, VOLS 1-3, PROCEEDINGS, 2006, : 1353 - +
  • [40] Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications
    Zhang, Yuan
    Mao, Yunlong
    Xu, Minze
    Xu, Fengyuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1008 - 1018