首页> 外文会议>International conference on the theory and application of cryptology and information security >Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages
【24h】

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages

机译:位置,位置,位置:基于位置的侧通道泄漏的重新建模和开发

获取原文

摘要

Near-field microprobes have the capability to isolate small regions of a chip surface and enable precise measurements with high spatial resolution. Being able to distinguish the activity of small regions has given rise to the location-based side-channel attacks, which exploit the spatial dependencies of cryptographic algorithms in order to recover the secret key. Given the fairly uncharted nature of such leakages, this work revisits the location side-channel to broaden our modeling and exploitation capabilities. Our contribution is threefold. First, we provide a simple spatial model that partially captures the effect of location-based leakages. We use the newly established model to simulate the leakage of different scenarios/countermeasures and follow an information-theoretic approach to evaluate the security level achieved in every case. Second, we perform the first successful location-based attack on the SRAM of a modern ARM Cortex-M4 chip, using standard techniques such as difference of means and multivariate template attacks. Third, we put forward neural networks as classifiers that exploit the location side-channel and showcase their effectiveness on ARM Cortex-M4, especially in the context of single-shot attacks and small memory regions. Template attacks and neural network classifiers are able to reach high spacial accuracy, distinguishing between 2 SRAM regions of 128 bytes each with 100% success rate and distinguishing even between 256 SRAM byte-regions with 32% success rate. Such improved exploitation capabilities revitalize the interest for location vulnerabilities on various implementations, ranging from RSA/ECC with large memory footprint, to lookup-table-based AES with smaller memory usage.
机译:近场微探针具有隔离芯片表面小区域并能够以高空间分辨率进行精确测量的能力。能够区分小区域的活动引起了基于位置的边信道攻击,这种攻击利用密码算法的空间依赖性来恢复秘密密钥。鉴于此类泄漏的本质尚不为人所知,这项工作将重新审视位置旁通道,以扩大我们的建模和开发能力。我们的贡献是三倍。首先,我们提供了一个简单的空间模型,该模型可以部分捕获基于位置的泄漏的影响。我们使用新建立的模型来模拟不同方案/对策的泄漏,并遵循信息论方法评估每种情况下实现的安全级别。其次,我们使用标准技术(例如均值差异和多变量模板攻击)对现代ARM Cortex-M4芯片的SRAM进行了首次成功的基于位置的攻击。第三,我们提出了神经网络作为分类器,可以利用位置旁通道并展示其在ARM Cortex-M4上的有效性,尤其是在单发攻击和较小内存区域的情况下。模板攻击和神经网络分类器能够达到很高的空间精度,可以区分2个128字节的SRAM区域,每个区域的成功率为100%,甚至可以区分256个SRAM字节的区域,成功率为32%。此类经过改进的利用功能使人们对各种实现方式上的位置漏洞的兴趣重新焕发了活力,这些漏洞包括具有较大内存占用量的RSA / ECC到具有较小内存使用量的基于查找表的AES。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号