Bernoulli at the Root of Horizontal Side Channel Attacks

被引:0
|
作者
Cler, Gauthier [1 ,2 ]
Ordas, Sebastien [2 ]
Maurine, Philippe [1 ]
机构
[1] Univ Montpellier, LIRMM, Montpellier, France
[2] SERMA Safety & Secur ITSEF, Pessac, France
关键词
Security; Side Channel Analysis; Unsupervised; Horizontal Attacks; POWER ANALYSIS;
D O I
10.1007/978-3-031-54409-5_6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Vertical side-channel attacks represent a major threat to the confidentiality of enclosed secrets in hardware devices. Fortunately, countermeasures such as blinding or masking are nowadays quasi-systematically used to protect implementations of asymmetric cryptographic algorithms (RSA, ECDSA). Horizontal attacks thus constitute an interesting alternative for adversaries. They aim at recovering the secret exponent or scalar using a single trace, thus bypassing the blinding countermeasure. Several attacks have been proposed, based for instance on statistical distinguisher or clustering techniques. However, the success of these attacks relies heavily on the selection of Points of Interest (PoI) carrying leakage, extracted from acquired signals. In this context, this work aims at providing a framework for the selection of PoI in the context of noisy traces. It is based on statistical tests applied to the distribution of each point; these tests have been derived from the analysis of noise impact on distributions. Experiments performed with this framework emphasize a gap reduction in terms of attack success rates between unsupervised and supervised attacks.
引用
收藏
页码:107 / 126
页数:20
相关论文
共 50 条
  • [1] Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
    Battistello, Alberto
    Coron, Jean-Sebastien
    Prouff, Emmanuel
    Zeitoun, Rina
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 23 - 39
  • [2] Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
    Nascimento, Erick
    Chmielewski, Lukasz
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 213 - 231
  • [3] Side Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1950 - 1961
  • [5] Adaptive Channel Estimation in Side Channel Attacks
    Jin, Shan
    Bettati, Riccardo
    2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2018,
  • [6] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [7] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [8] Optical Side Channel Attacks on Singlechip
    Wang, H. S.
    Ji, D. G.
    Zhang, Y.
    Chen, K. Y.
    Chen, J. G.
    Wang, Y. Z.
    Wu, L. A.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015), 2015, 34 : 364 - 369
  • [9] Side Channel Attacks and Their Mitigation Techniques
    Khan, Ajoy Kumar
    Mahanta, Hridoy Jyoti
    2014 FIRST INTERNATIONAL CONFERENCE ON AUTOMATION, CONTROL, ENERGY & SYSTEMS (ACES-14), 2014, : 133 - 136
  • [10] Special Issue on "Side Channel Attacks"
    Hong, Seokhie
    APPLIED SCIENCES-BASEL, 2019, 9 (09):