Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks

被引:3
|
作者
Kiaei, Pantea [1 ]
Mercadier, Darius [2 ]
Dagand, Pierre-Evariste [2 ]
Heydemann, Karine [2 ]
Schaumont, Patrick [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] LIP6, Paris, France
[3] Worcester Polytech Inst, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Side-channel leakage; Fault injection; Bitslice programming; POWER ANALYSIS; IMPLEMENTATION;
D O I
10.1007/978-3-030-68773-1_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing to the experimental dimension of this body of work, we propose a customized processor called SKIVA that supports experiments with the design of countermeasures against a broad range of implementation attacks. Based on bitslice programming and recent advances in the literature, SKIVA offers a flexible and modular combination of countermeasures against power-based and timing-based side-channel leakage and fault injection. Multiple configurations of side-channel protection and fault protection enable the programmer to select the desired number of shares and the desired redundancy level for each slice. Recurring and security-sensitive operations are supported in hardware through custom instruction-set extensions. The new instructions support bitslicing, secret-share generation, redundant logic computation, and fault detection. We demonstrate and analyze multiple versions of AES from a side-channel analysis and a fault-injection perspective, in addition to providing a detailed performance evaluation of the protected designs. To our knowledge, this is the first validated end-to-end implementation of a modular bitslice-oriented countermeasure.
引用
收藏
页码:221 / 253
页数:33
相关论文
共 50 条
  • [21] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [22] Extractors against side-channel attacks: weak or strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) : 231 - 241
  • [23] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1573 - 1576
  • [24] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [25] Extractors against Side-Channel Attacks: Weak or Strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 256 - 272
  • [26] Combined Fault and Side-Channel Attacks on the AES Key Schedule
    Dassance, Francois
    Venelli, Alexandre
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2012, : 63 - 71
  • [27] Physical functions: the common factor of side-channel and fault attacks?
    Robisson, Bruno
    Le Bouder, Helene
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 217 - 227
  • [28] ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
    Schneider, Tobias
    Moradi, Amir
    Gueneysu, Tim
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 39 - 39
  • [29] ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
    Schneider, Tobias
    Moradi, Amir
    Gueneysu, Tim
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 302 - 332
  • [30] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14