首页> 外文会议>International Symposium on Applied Reconfigurable Computing >Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks
【24h】

Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks

机译:基于侧通道攻击的基于对策的移动目标和实现多样性

获取原文

摘要

Side-channel attacks (SCAs) are among the major threats to embedded systems' security, where implementation characteristics of cryptographic algorithms are exploited to extract secret parameters. The most common SCAs take advantage of electromagnetic (EM) leakage or power consumption recorded during device operation by placing an EM probe over the chip or measuring the voltage drop across an internal resistor, respectively. In this work, two SCA countermeasures are presented which address these two types of leakage vectors. The first countermea-sure supports implementation diversity and moving target defense, while the second one generates random algorithmic noise. These concepts are implemented using the dynamic partial reconfiguration (DPR) feature of modern FPGA devices. Both of the countermeasures are easily scalable, and the effect of scalability on the area overhead and security strength is presented. We evaluate our design by measuring EM emanations from a state-of-the-art Systern-on-Chip (SoC) with 16 nm production technology. With the most secure variant, we are able to increase the resistance against Correlation Power Analysis (CPA) by a factor of 95 compared to an unprotected AES implementation.
机译:侧通道攻击(SCAS)是嵌入式系统安全性的主要威胁之一,其中利用加密算法的实现特征来提取秘密参数。通过将EM探针放置在芯片上或测量内部电阻上的电压降,可以在设备操作期间记录的电磁(EM)泄漏或功耗​​中的最常见的SCA。在这项工作中,提出了两个SCA对策,用于解决这两种类型的泄漏矢量。第一个抵消支持实施多样性和移动目标防御,而第二个则生成随机算法噪声。使用现代FPGA设备的动态部分重新配置(DPR)特征来实现这些概念。两者的对策都很容易可扩展,并提出了可扩展性对面积开销和安全强度的影响。我们通过使用16个NM生产技术测量来自最先进的交换设备的EM散发来评估我们的设计。通过最安全的变体,与未受保护的AES实现相比,我们能够将抗相关功率分析(CPA)的阻力增加了95倍。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号