Formal Definition and Verification for Combined Random Fault and Random Probing Security

被引:0
|
作者
Belaid, Sonia [1 ]
Feldtkeller, Jakob [2 ]
Gueneysu, Tim [2 ,3 ]
Guinet, Anna [2 ]
Richter-Brockmann, Jan [2 ]
Rivain, Matthieu [1 ]
Sasdrich, Pascal [2 ]
Taleb, Abdul Rahman [1 ]
机构
[1] CryptoExperts, Paris, France
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[3] DFKI, Bremen, Germany
关键词
Physical Security; Random Probing Model; Random Fault Model; Combined Analysis; VERICA; IronMask; SIDE-CHANNEL; PRIVATE CIRCUITS; COUNTERMEASURES;
D O I
10.1007/978-981-96-0941-3_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our highly digitalized world, an adversary is not constrained to purely digital attacks but can monitor or influence the physical execution environment of a target computing device. Such side-channel or fault-injection analysis poses a significant threat to otherwise secure cryptographic implementations. Hence, it is important to consider additional adversarial capabilities when analyzing the security of cryptographic implementations besides the default black-box model. For side-channel analysis, this is done by providing the adversary with knowledge of some internal values, while for fault-injection analysis the capabilities of the adversaries include manipulation of some internal values. In this work, we extend probabilistic security models for physical attacks, by introducing a general random probing model and a general random fault model to enable security analysis with arbitrary leakage and fault distributions, as well as the combination of these models. Our aim is to enable a more accurate modeling of low-level physical effects. We then analyze important properties, such as the impact of adversarial knowledge on faults and compositions, and provide tool-based formal verification methods that allow the security assessment of design components. These methods are introduced as extension of previous tools VERICA and IronMask which are implemented, evaluated and compared.
引用
收藏
页码:167 / 200
页数:34
相关论文
共 50 条
  • [21] Formal Verification and Security Analysis of AMQP
    Liu, Huiying
    Dong, Wenting
    Zhu, Huibiao
    Su, Ziqing
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2177 - 2182
  • [22] Modelling and Formal Verification Approach for Microgrid Energy Management Systems under Random Load
    Fellah, Karim
    Abbou, Rosa
    IFAC PAPERSONLINE, 2024, 58 (01): : 270 - 275
  • [23] Probing the large deviations for the beta random walk in random medium
    Hartmann, Alexander K.
    Krajenbrink, Alexandre
    Le Doussal, Pierre
    PHYSICAL REVIEW E, 2024, 109 (02)
  • [24] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [25] ANALYSIS OF RANDOM PROBING HASHING
    RAMAKRISHNA, MV
    INFORMATION PROCESSING LETTERS, 1989, 31 (02) : 83 - 90
  • [26] FORMAL DEFINITION AND VERIFICATION OF DATA FLOW DIAGRAMS
    TAO, YL
    KUNG, CH
    JOURNAL OF SYSTEMS AND SOFTWARE, 1991, 16 (01) : 29 - 36
  • [27] PROBING A RANDOM MEDIUM WITH A PULSE
    BURRIDGE, R
    PAPANICOLAOU, G
    SHENG, P
    WHITE, B
    SIAM JOURNAL ON APPLIED MATHEMATICS, 1989, 49 (02) : 582 - 607
  • [28] Formal Verification and Visualization of Security Policies
    Wahsheh, Luay A.
    de Leon, Daniel Conte
    Alves-Foss, Jim
    JOURNAL OF COMPUTERS, 2008, 3 (06) : 22 - 31
  • [29] Resolution analysis by random probing
    Fichtner, Andreas
    van Leeuwen, Tristan
    JOURNAL OF GEOPHYSICAL RESEARCH-SOLID EARTH, 2015, 120 (08) : 5549 - 5573
  • [30] The Random Fault Model
    Dhooghe, Siemen
    Nikova, Svetla
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 191 - 212