In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh...In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation.展开更多
侧信道攻击技术越来越受到业界的重视,同时越来越多的标准和认证体系均增加了防护侧信道攻击能力评判的需求,如中国数字版权管理体系中的Enhanced Profile。本文阐述了在芯片的硅前(Pre-silicon)设计阶段对处理重要信息和内容的系统模...侧信道攻击技术越来越受到业界的重视,同时越来越多的标准和认证体系均增加了防护侧信道攻击能力评判的需求,如中国数字版权管理体系中的Enhanced Profile。本文阐述了在芯片的硅前(Pre-silicon)设计阶段对处理重要信息和内容的系统模块抗攻击性能(特别是针对侧信道攻击)进行验证的重要性,并介绍了一种名为"Virtualyzr"的工具,该工具可以验证在RTL(Register Transfer Level)设计阶段芯片对侧信道攻击的防护能力,该工具将侧信道攻击漏洞转化为设计代码中的漏洞,进而帮助设计人员实现更为安全的设计。展开更多
基金This work is partly financed via National Key Research and Development Program of China(2020AAA0107700)National Natural Science Foundation of China(62227805,62072398)+6 种基金SUTD-ZJU IDEA Grant for visiting professors(SUTD-ZJUVP201901)Alibaba-Zhejiang University Joint Institute of Frontier TechnologiesNational Key Laboratory of Science and Technology on Information System Security(6142111210301)State Key Laboratory of Mathematical Engineering and Advanced ComputingKey Laboratory of Cyberspace Situation Awareness of Henan Province(HNTS2022001)RISQ(http://risq.fr/)PIA ProjectBRAINE Project from European Union’s Horizon 2020/ECSEL research and innovation program(N◦876967)。
文摘In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study t</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">hem thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation.
文摘侧信道攻击技术越来越受到业界的重视,同时越来越多的标准和认证体系均增加了防护侧信道攻击能力评判的需求,如中国数字版权管理体系中的Enhanced Profile。本文阐述了在芯片的硅前(Pre-silicon)设计阶段对处理重要信息和内容的系统模块抗攻击性能(特别是针对侧信道攻击)进行验证的重要性,并介绍了一种名为"Virtualyzr"的工具,该工具可以验证在RTL(Register Transfer Level)设计阶段芯片对侧信道攻击的防护能力,该工具将侧信道攻击漏洞转化为设计代码中的漏洞,进而帮助设计人员实现更为安全的设计。