Bernoulli at the Root of Horizontal Side Channel Attacks

被引:0
|
作者
Cler, Gauthier [1 ,2 ]
Ordas, Sebastien [2 ]
Maurine, Philippe [1 ]
机构
[1] Univ Montpellier, LIRMM, Montpellier, France
[2] SERMA Safety & Secur ITSEF, Pessac, France
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023 | 2024年 / 14530卷
关键词
Security; Side Channel Analysis; Unsupervised; Horizontal Attacks; POWER ANALYSIS;
D O I
10.1007/978-3-031-54409-5_6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Vertical side-channel attacks represent a major threat to the confidentiality of enclosed secrets in hardware devices. Fortunately, countermeasures such as blinding or masking are nowadays quasi-systematically used to protect implementations of asymmetric cryptographic algorithms (RSA, ECDSA). Horizontal attacks thus constitute an interesting alternative for adversaries. They aim at recovering the secret exponent or scalar using a single trace, thus bypassing the blinding countermeasure. Several attacks have been proposed, based for instance on statistical distinguisher or clustering techniques. However, the success of these attacks relies heavily on the selection of Points of Interest (PoI) carrying leakage, extracted from acquired signals. In this context, this work aims at providing a framework for the selection of PoI in the context of noisy traces. It is based on statistical tests applied to the distribution of each point; these tests have been derived from the analysis of noise impact on distributions. Experiments performed with this framework emphasize a gap reduction in terms of attack success rates between unsupervised and supervised attacks.
引用
收藏
页码:107 / 126
页数:20
相关论文
共 50 条
  • [21] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [22] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [23] Side channel attacks on irregularly decimated generators
    Loe, Chuan-Wen
    Khoo, Khoongming
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 116 - 130
  • [24] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [25] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [26] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [27] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [28] Side channel attacks on message authentication codes
    Okeya, K
    Iwata, T
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 205 - 217
  • [29] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [30] Flexible exponentiation with resistance to side channel attacks
    Vuillaume, Camille
    Okeya, Katsuyuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 268 - 283