Securing Optimized Code Against Power Side Channels

被引:0
|
作者
Tsoupidi, Rodothea Myrsini [1 ]
Lozano, Roberto Casta Neda
Troubitsyna, Elena [1 ]
Papadimitratos, Panagiotis [1 ]
机构
[1] Royal Inst Technol KTH, Stockholm, Sweden
关键词
compilation; power side-channel attacks; code optimization; software masking; constraint programming;
D O I
10.1109/CSF57540.2023.00016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks impose a serious threat to cryptographic algorithms, including widely employed ones, such as AES and RSA. These attacks take advantage of the algorithm implementation in hardware or software to extract secret information via side channels. Software masking is a mitigation approach against power side-channel attacks aiming at hiding the secret-revealing dependencies from the power footprint of a vulnerable implementation. However, this type of software mitigation often depends on general-purpose compilers, which do not preserve non-functional properties. Moreover, microarchitectural features, such as the memory bus and register reuse, may also leak secret information. These abstractions are not visible at the high-level implementation of the program. Instead, they are decided at compile time. To remedy these problems, security engineers often sacrifice code efficiency by turning off compiler optimization and/or performing local, post-compilation transformations. This paper proposes Secure by Construction Code Generation (SecCG), a constraint-based compiler approach that generates optimized yet protected against power side channels code. SecCG controls the quality of the mitigated program by efficiently searching the best possible low-level implementation according to a processor cost model. In our experiments with twelve masked cryptographic functions up to 100 lines of code on Mips32 and ARM Thumb, SecCG speeds up the generated code from 77% to 6.6 times compared to non-optimized secure code with an overhead of up to 13% compared to non-secure optimized code at the expense of a high compilation cost. For security and compiler researchers, this paper proposes a formal model to generate power side channel free low-level code. For software engineers, SecCG provides a practical approach to optimize performance critical and vulnerable cryptographic implementations that preserve security properties against power side channels.
引用
收藏
页码:340 / 355
页数:16
相关论文
共 50 条
  • [31] Securing code in services oriented architecture
    Priego, Emilio Rodriguez
    Garcia, Francisco J.
    WEB ENGINEERING, PROCEEDINGS, 2007, 4607 : 550 - +
  • [32] Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
    Shrivastava, Rajesh Kumar
    Singh, Simar Preet
    Hasan, Mohammad Kamrul
    Gagandeep
    Islam, Shayla
    Abdullah, Salwani
    Aman, Azana Hafizah Mohd
    COMPUTER COMMUNICATIONS, 2022, 193 : 38 - 46
  • [33] Maya: Using Formal Control to Obfuscate Power Side Channels
    Pothukuchi, Raghavendra Pradyumna
    Pothukuchi, Sweta Yamini
    Voulgaris, Petros G.
    Schwing, Alexander
    Torrellas, Josep
    IEEE MICRO, 2022, 42 (04) : 48 - 58
  • [34] Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks
    De Cnudde, Thomas
    Nikova, Svetla
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3291 - 3301
  • [35] Efficient power and timing side channels for physical unclonable functions
    Rührmair, Ulrich
    Xu, Xiaolin
    Sölter, Jan
    Mahmoud, Ahmed
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Burleson, Wayne
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 476 - 492
  • [36] Efficient Power and Timing Side Channels for Physical Unclonable Functions
    Ruehrmair, Ulrich
    Xu, Xiaolin
    Soelter, Jan
    Mahmoud, Ahmed
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Burleson, Wayne
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 476 - 492
  • [37] DNN Architecture Attacks via Network and Power Side Channels
    Dai, Yuanjun
    Guo, Qingzhe
    Wang, An
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 63 - 87
  • [38] Maya: Using Formal Control to Obfuscate Power Side Channels
    Pothukuchi, Raghavendra Pradyumna
    Pothukuchi, Sweta Yamini
    Voulgaris, Petros G.
    Schwing, Alexander
    Torrellas, Josep
    2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), 2021, : 888 - 901
  • [39] Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 690 - 702
  • [40] Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping
    Duo, Bin
    Luo, Junsong
    Li, Yilian
    Hu, Hao
    Wang, Zibin
    CHINA COMMUNICATIONS, 2021, 18 (01) : 88 - 99