Securing Optimized Code Against Power Side Channels

被引:0
|
作者
Tsoupidi, Rodothea Myrsini [1 ]
Lozano, Roberto Casta Neda
Troubitsyna, Elena [1 ]
Papadimitratos, Panagiotis [1 ]
机构
[1] Royal Inst Technol KTH, Stockholm, Sweden
来源
2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF | 2023年
关键词
compilation; power side-channel attacks; code optimization; software masking; constraint programming;
D O I
10.1109/CSF57540.2023.00016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks impose a serious threat to cryptographic algorithms, including widely employed ones, such as AES and RSA. These attacks take advantage of the algorithm implementation in hardware or software to extract secret information via side channels. Software masking is a mitigation approach against power side-channel attacks aiming at hiding the secret-revealing dependencies from the power footprint of a vulnerable implementation. However, this type of software mitigation often depends on general-purpose compilers, which do not preserve non-functional properties. Moreover, microarchitectural features, such as the memory bus and register reuse, may also leak secret information. These abstractions are not visible at the high-level implementation of the program. Instead, they are decided at compile time. To remedy these problems, security engineers often sacrifice code efficiency by turning off compiler optimization and/or performing local, post-compilation transformations. This paper proposes Secure by Construction Code Generation (SecCG), a constraint-based compiler approach that generates optimized yet protected against power side channels code. SecCG controls the quality of the mitigated program by efficiently searching the best possible low-level implementation according to a processor cost model. In our experiments with twelve masked cryptographic functions up to 100 lines of code on Mips32 and ARM Thumb, SecCG speeds up the generated code from 77% to 6.6 times compared to non-optimized secure code with an overhead of up to 13% compared to non-secure optimized code at the expense of a high compilation cost. For security and compiler researchers, this paper proposes a formal model to generate power side channel free low-level code. For software engineers, SecCG provides a practical approach to optimize performance critical and vulnerable cryptographic implementations that preserve security properties against power side channels.
引用
收藏
页码:340 / 355
页数:16
相关论文
共 50 条
  • [21] Securing power
    Grünbaum, Rolf
    Lundberg, Peter
    Thorvaldsson, Björn
    ABB Review, 2010, (01): : 49 - 56
  • [22] Securing Applications against Side-channel Attacks through Resource Access Veto
    Osman, Tousif
    Mannan, Mohammad
    Hengartner, Urs
    Youssef, Amr
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (04):
  • [23] A new method for securing elliptic scalar multiplication against side-channel attacks
    Lim, CH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 289 - 300
  • [24] Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
    Jinbao Zhang
    Ning Wu
    Fang Zhou
    Fen Ge
    Xiaoqiang Zhang
    Journal of Electrical Engineering & Technology, 2019, 14 : 2171 - 2180
  • [25] Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
    Zhang, Jinbao
    Wu, Ning
    Zhou, Fang
    Ge, Fen
    Zhang, Xiaoqiang
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2019, 14 (05) : 2171 - 2180
  • [26] On Code Execution Tracking via Power Side-Channel
    Liu, Yannan
    Wei, Lingxiao
    Zhou, Zhe
    Zhang, Kehuan
    Xu, Wenyuan
    Xu, Qiang
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1019 - 1031
  • [27] BER-optimized power allocation for fading relay channels
    Fareed, Muhammad Mehboob
    Uysal, Murat
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2350 - 2359
  • [28] Practical Quantum Key Distribution That is Secure Against Side Channels
    Navarrete, Alvaro
    Pereira, Margarida
    Curty, Marcos
    Tamaki, Kiyoshi
    PHYSICAL REVIEW APPLIED, 2021, 15 (03):
  • [29] LDPC code design for nonuniform power-line channels
    Sanaei, Ali
    Ardakani, Masoud
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2007, 2007 (1)
  • [30] LDPC Code Design for Nonuniform Power-Line Channels
    Ali Sanaei
    Masoud Ardakani
    EURASIP Journal on Advances in Signal Processing, 2007