An Architecture-Independent Instruction Shuffler to Protect against Side-Channel Attacks

被引:22
|
作者
Bayrak, Ali Galip [1 ]
Velickovic, Nikola [1 ]
Ienne, Paolo [1 ]
Burleson, Wayne [2 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[2] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
关键词
Design; Security; Performance; Side-channel attacks; instruction shuffler; random permutation generation; BIT PERMUTATIONS; DESIGN;
D O I
10.1145/2086696.2086699
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded cryptographic systems, such as smart cards, require secure implementations that are robust to a variety of low-level attacks. Side-Channel Attacks (SCA) exploit the information such as power consumption, electromagnetic radiation and acoustic leaking through the device to uncover the secret information. Attackers can mount successful attacks with very modest resources in a short time period. Therefore, many methods have been proposed to increase the security against SCA. Randomizing the execution order of the instructions that are independent, i.e., random shuffling, is one of the most popular among them. Implementing instruction shuffling in software is either implementation specific or has a significant performance or code size overhead. To overcome these problems, we propose in this work a generic custom hardware unit to implement random instruction shuffling as an extension to existing processors. The unit operates between the CPU and the instruction cache (or memory, if no cache exists), without any modification to these components. Both true and pseudo random number generators are used to dynamically and locally provide the shuffling sequence. The unit is mainly designed for in-order processors, since the embedded devices subject to these kind of attacks use simple in-order processors. More advanced processors (e.g., superscalar, VLIW or EPIC processors) are already more resistant to these attacks because of their built-in ILP and wide word size. Our experiments on two different soft in-order processor cores, i.e., OpenRISC and MicroBlaze, implemented on FPGA show that the proposed unit could increase the security drastically with very modest resource overhead. With around 2% area, 1.5% power and no performance overhead, the shuffler increases the effort to mount a successful power analysis attack on AES software implementation over 360 times.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks
    Kiaei, Pantea
    Mercadier, Darius
    Dagand, Pierre-Evariste
    Heydemann, Karine
    Schaumont, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 221 - 253
  • [2] Hardware countermeasure against side-channel attacks based on randomized instruction injection
    He, Zhangqing
    Ao, Tianyong
    Liu, Kai
    Dai, Kui
    He, Z. (ivan_hee@126.com), 1600, Huazhong University of Science and Technology (42): : 128 - 132
  • [3] Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling
    Liu, Li
    Wang, An
    Zang, WanYu
    Yu, Meng
    Xiao, Menbai
    Chen, Songqing
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 491 - 511
  • [4] Enhancing EMI-Packaging to Protect against Fault Injection and Side-Channel Attacks
    Avital, Moshe
    Weisman, Gil
    Moscovitz, Doron
    Levi, Itamar
    2024 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS, BIOMEDICAL ENGINEERING AND ELECTRONIC SYSTEMS, COMCAS 2024, 2024,
  • [5] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [6] Camo-DNN: Layer Camouflaging to Protect DNNs against Timing Side-Channel Attacks
    Ahmadi, Mahya Morid
    Alrahis, Lilas
    Sinanoglu, Ozgur
    Shafique, Muhammad
    2024 IEEE 30TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN, IOLTS 2024, 2024,
  • [7] Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 898 - 905
  • [8] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [9] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [10] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773