Exploring Cortex-M Microarchitectural Side Channel Information Leakage

نویسندگان

چکیده

The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge the CPU memory information leakage patterns; a description such leakages is presently not disclosed by any processor design company. In this work we propose first Instruction Set Architecture (ISA) level framework for microarchitectural characterization. Our allows to extract profile from superscalar in-order processor; infer detailed pipeline characteristics through observation instruction timings, provide identification datapath registers via measuring setup. extracted model can serve as foundation building solid countermeasures against attacks on software We validate models ARM Cortex-M4 Cortex-M7 CPUs, latter being most powerful microcontrollers offer. Finally, further demonstration our model’s accuracy, mount successful unprotected AES implementations each examined platforms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side Channel Leakage Analysis

Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...

متن کامل

Side-Channel Leakage across Borders

More and more embedded devices store sensitive information that is protected by means of cryptography. The confidentiality of this data is threatened by information leakage via side channels like the power consumption or the electromagnetic radiation. In this paper, we show that the side-channel leakage in the power consumption is not limited to the power-supply lines and that any input/output ...

متن کامل

Quantifying Side-Channel Information Leakage from Web Applications

Recent research has shown that many popular web applications are vulnerable to side-channel attacks on encrypted streams of network data produced by the interaction of a user with an application. As a result, private user data is susceptible to being recovered by a side-channel adversary. A recent focus has been on the development of tools for the detection and quantification of side-channel in...

متن کامل

Title: Advances in Side-Channel Cryptanalysis: MicroArchitectural Attacks

approved: Çetin Kaya Koç Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal the secret key. Side-channel cryptanalysis uses ...

متن کامل

Side-Channel Leakage of Masked CMOS Gates

There are many articles and patents on the masking of logic gates. However, the existing publications assume that a masked logic gate switches its output no more than once per clock cycle. Unfortunately, this assumption usually does not hold true in practice. In this article, we show that glitches occurring in circuits of masked gates make these circuits susceptible to classical first-order DPA...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3124761