Bernoulli at the Root of Horizontal Side Channel Attacks

被引:0
|
作者
Cler, Gauthier [1 ,2 ]
Ordas, Sebastien [2 ]
Maurine, Philippe [1 ]
机构
[1] Univ Montpellier, LIRMM, Montpellier, France
[2] SERMA Safety & Secur ITSEF, Pessac, France
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023 | 2024年 / 14530卷
关键词
Security; Side Channel Analysis; Unsupervised; Horizontal Attacks; POWER ANALYSIS;
D O I
10.1007/978-3-031-54409-5_6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Vertical side-channel attacks represent a major threat to the confidentiality of enclosed secrets in hardware devices. Fortunately, countermeasures such as blinding or masking are nowadays quasi-systematically used to protect implementations of asymmetric cryptographic algorithms (RSA, ECDSA). Horizontal attacks thus constitute an interesting alternative for adversaries. They aim at recovering the secret exponent or scalar using a single trace, thus bypassing the blinding countermeasure. Several attacks have been proposed, based for instance on statistical distinguisher or clustering techniques. However, the success of these attacks relies heavily on the selection of Points of Interest (PoI) carrying leakage, extracted from acquired signals. In this context, this work aims at providing a framework for the selection of PoI in the context of noisy traces. It is based on statistical tests applied to the distribution of each point; these tests have been derived from the analysis of noise impact on distributions. Experiments performed with this framework emphasize a gap reduction in terms of attack success rates between unsupervised and supervised attacks.
引用
收藏
页码:107 / 126
页数:20
相关论文
共 50 条
  • [31] Photonic Side Channel Attacks Against RSA
    Carmon, Elad
    Seifert, Jean-Pierre
    Wool, Avishai
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 74 - 78
  • [32] The Temperature Side Channel and Heating Fault Attacks
    Hutter, Michael
    Schmidt, Joern-Marc
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 219 - +
  • [33] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [34] Univariate side channel attacks and leakage modeling
    Doget, Julien
    Prouff, Emmanuel
    Rivain, Matthieu
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) : 123 - 144
  • [35] Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques
    Kaur S.
    Singh B.
    Kaur H.
    SN Computer Science, 2021, 2 (3)
  • [36] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [37] Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks
    Barbu, Guillaume
    Castelnovi, Laurent
    Chabrier, Thomas
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 105 - 125
  • [38] Synthesis of Masking Countermeasures against Side Channel Attacks
    Eldib, Hassan
    Wang, Chao
    COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 114 - 130
  • [39] Distance Based Leakage Alignment for Side Channel Attacks
    Yang, Wei
    Cao, Yuchen
    Zhou, Yongbin
    Zhang, Hailong
    Zhang, Qian
    IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (04) : 419 - 423
  • [40] A Leak Resistant Architecture against Side Channel Attacks
    Mesquita, Daniel
    Badrignan, Benoit
    Torres, Lionel
    Sassattell, Gilles
    Robert, Michel
    Bajard, Jean-Claude
    Moraes, Fernando
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 881 - 884