Bernoulli at the Root of Horizontal Side Channel Attacks

被引:0
|
作者
Cler, Gauthier [1 ,2 ]
Ordas, Sebastien [2 ]
Maurine, Philippe [1 ]
机构
[1] Univ Montpellier, LIRMM, Montpellier, France
[2] SERMA Safety & Secur ITSEF, Pessac, France
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023 | 2024年 / 14530卷
关键词
Security; Side Channel Analysis; Unsupervised; Horizontal Attacks; POWER ANALYSIS;
D O I
10.1007/978-3-031-54409-5_6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Vertical side-channel attacks represent a major threat to the confidentiality of enclosed secrets in hardware devices. Fortunately, countermeasures such as blinding or masking are nowadays quasi-systematically used to protect implementations of asymmetric cryptographic algorithms (RSA, ECDSA). Horizontal attacks thus constitute an interesting alternative for adversaries. They aim at recovering the secret exponent or scalar using a single trace, thus bypassing the blinding countermeasure. Several attacks have been proposed, based for instance on statistical distinguisher or clustering techniques. However, the success of these attacks relies heavily on the selection of Points of Interest (PoI) carrying leakage, extracted from acquired signals. In this context, this work aims at providing a framework for the selection of PoI in the context of noisy traces. It is based on statistical tests applied to the distribution of each point; these tests have been derived from the analysis of noise impact on distributions. Experiments performed with this framework emphasize a gap reduction in terms of attack success rates between unsupervised and supervised attacks.
引用
收藏
页码:107 / 126
页数:20
相关论文
共 50 条
  • [41] Side channel attacks for architecture extraction of neural networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) : 3 - 16
  • [42] Combining Algebraic and Side Channel Attacks on Stream Ciphers
    Kazmi, Asif Raza
    Afzal, Mehreen
    Amjad, Muhammad Faisal
    Rashdi, Adnan
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 138 - 142
  • [43] Side-Channel Expectation-Maximization Attacks
    Béguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
  • [44] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [45] Side channel attacks on Smart Cards: Threats & countermeasures
    Krieger, U
    SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 73 - 81
  • [46] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228
  • [47] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [48] Side Channel Attacks and the Non Volatile Memory of the Future
    Dyka, Zoya
    Walcyk, Christian
    Walczyk, Damian
    Wenger, Christian
    Langendoerfer, Peter
    CASES'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURES AND SYNTHESIS FOR EMBEDDED SYSTEMS, 2012, : 13 - 15
  • [49] Actual and Historical State of Side Channel Attacks Theory
    Krasovsky, Andrey V.
    Maro, Ekaterina A.
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [50] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98