Filters








18,622 Hits in 3.3 sec

A Comparison Study on Flush+Reload and Prime+Probe Attacks on AES Using Machine Learning Approaches [chapter]

Zirak Allaf, Mo Adda, Alexander Gegov
2017 Advances in Intelligent Systems and Computing  
There has been a good deal of research into the use of side channel attacks on these algorithms.  ...  AES, ElGamal are two examples of algorithms that have been developed in cryptography to protect data in a variety of domains including native and cloud systems, and mobile applications.  ...  We concluded that a heavy workload has a negative impact on the detection rate due to stress on the CPU components.  ... 
doi:10.1007/978-3-319-66939-7_17 fatcat:z7txd5bgzrcijjax657bqhfq7i

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator [article]

Monodeep Kar, Arvind Singh, Sanu Mathew, Santosh Ghosh, Anand Rajan, Vivek De, Raheem Beyah, Saibal Mukhopadhyay
2018 arXiv   pre-print
The EM measurements are performed on a test-chip containing two architectures of a 128-bit Advanced Encryption Standard (AES) engine powered by a high-frequency R-IVR and under two attack scenarios, one  ...  However, we show that EM emission from the R-IVR blinds the attacker and significantly reduces SCA vulnerability of the AES engine.  ...  As HP-AES is more robust to a CEMA, we used TVLA and CEMA for experiments on HP-AES, whereas only CEMA was used for experiments on LP-AES. A.  ... 
arXiv:1802.09096v1 fatcat:54hroghx5vbadngabdwwjtp6yq

Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm

Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Rao Naveed Bin Rais, Vianney Lapotre, Guy Gogniat
2018 2018 Global Information Infrastructure and Networking Symposium (GIIS)  
This paper presents a run-time detection mechanism for access-driven cache-based Side-Channel Attacks (CSCAs) on Intel's x86 architecture.  ...  Experiments are performed with two different implementations of AES cryptosystem while under Prime+Probe attack.  ...  We perform experiments with Prime+Probe attack applied on two different implementations of AES, which is considerably a fast encryption algorithm.  ... 
doi:10.1109/giis.2018.8635767 dblp:conf/giis/MushtaqABRLG18 fatcat:rbmv56qiarbl5lkx2ar2eampiq

Security testing of a secure cache design

Fangfei Liu, Ruby B. Lee
2013 Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP '13  
However, these cache designs seldom had their security verified experimentally by mounting cache side channel attacks on them.  ...  The results show that Newcache can defeat all these attacks. However, what if a very knowledgeable attacker crafted the attack strategy targeting the secure cache's design?  ...  A smarter attacker can perform W trials at the same time since at most one of the W trials can evict a cache line containing AES table entries.  ... 
doi:10.1145/2487726.2487729 dblp:conf/isca/LiuL13 fatcat:r3qszbxeh5eslpnompmteq67oa

On the Power of Optical Contactless Probing

Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
Recently, a powerful semiinvasive attack relying on optical contactless probing has been introduced, which can assist the attacker in circumventing the integrated countermeasures and probe the secret data  ...  on a chip.  ...  all these steps on a "training" device identical to the one she tries to attack.  ... 
doi:10.1145/3133956.3134039 dblp:conf/ccs/TajikLSB17 fatcat:dhzonae3ongybelyiostl56fna

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES

Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015 2015 IEEE Symposium on Security and Privacy  
Our new attack is a variation of the prime and probe cache attack whose applicability at the time is limited to L1 cache.  ...  The attack recovers AES keys in the cross-VM setting on Xen 4.1 with deduplication disabled, being only slightly less efficient than the flush and reload attack.  ...  We would also like to thank Craig Shue for his help on understanding huge page allocation procedures.  ... 
doi:10.1109/sp.2015.42 dblp:conf/sp/ApececheaES15 fatcat:yvu2nrgolfbcnb6hdjzl2ksteu

STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis

Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
2019 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
Today's availability of high-resolution electromagnetic (EM) probes mandates the need for a low-overhead solution to protect EM side-channel analysis (SCA) attacks.  ...  40 MHz, shows that the system remains secure against EM SCA attack even after 1M encryptions, with 67% energy efficiency and 1.23× area overhead compared to the unprotected AES.  ...  (a) The EM traces gathered from the oscilloscope, (b) CEMA attack on the unprotected AES core shows M T D < 600 traces.  ... 
doi:10.1109/hst.2019.8740839 dblp:conf/host/DasNCGS19 fatcat:7hopezpl45f5pfdij3thlkskca

Circuit-Variant Moving Target Defense for Side-Channel Attacks

Tristen Mullins, Brandon Baggett, Todd Andel, Todd McDonald
2022 International Conference on Cyber Warfare and Security (ICIW)  
We propose a System-on-a-Chip (SOC) countermeasure that will periodically reconfigure an AES scheme using randomly located S-box circuit variants.  ...  needed to perform a localized EM SCA attack.  ...  Therefore, this value is often the intermediate value on which DPA and DEMA attacks on AES are based.  ... 
doi:10.34190/iccws.17.1.14 fatcat:iqnothqzbfakrmgyo7exb6rxny

Vulnerability analysis for crypto devices against probing attack

Lingxiao Wei, Jie Zhang, Feng Yuan, Yannan Liu, Junfeng Fan, Qiang Xu
2015 The 20th Asia and South Pacific Design Automation Conference  
Probing attack is a severe threat for the security of hardware cryptographic modules (HCMs).  ...  attack on every signal in the circuit.  ...  Suppose we have a key candidate set K, and a data pattern d performing probing attacks on it.  ... 
doi:10.1109/aspdac.2015.7059113 dblp:conf/aspdac/WeiZYLFX15 fatcat:hpzemidihvgfthlvy52kzrdyzq

EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor [chapter]

Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
2014 Lecture Notes in Computer Science  
The sensor prototype is designed based on the proposed methodology together with a 128bit-key composite AES processor in 0.18µm CMOS with overheads of only 2respectively.  ...  The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a micro probe brought near the LSI.  ...  The AES processor was based on a common loop architecture operating at one round per clock cycle [19] .  ... 
doi:10.1007/978-3-662-44709-3_1 fatcat:w5ezlhbltra5bdhj5gtwkdm4cu

Integrated Sensor: A Backdoor for Hardware Trojan Insertions?

Xuan Thuy Ng, Zakaria Naj, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley
2015 2015 Euromicro Conference on Digital System Design  
Embedded system face a serious threat from physical attacks when applied in critical applications. Therefore, modern systems have several integrated sensors to detect potential threats.  ...  Two case studies are presented on Xilinx Virtex-5 FPGA. The first case study exploits the in-build temperature sensor of Virtex-5 system monitors while the other exploits a user deployed sensor.  ...  And the second one is a Probe Sensor recently presented at CHES 2014 [6] .  ... 
doi:10.1109/dsd.2015.119 dblp:conf/dsd/NgoNBRDG15 fatcat:lhpmah6cmne4hmuzimkvfbrolq

Side-channel leakage from sensor-based countermeasures against fault injection attack

Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, Makoto Nagata
2019 Microelectronics Journal  
We also propose a new cryptanalytic technique that efficiently exploit the leakage to attack AES.  ...  We show that an attacker can reveal an internal state by observing how the sensor reacts to laser fault injection. The leakage leads to a variant of probing attack that is feasible non-invasively.  ...  Related attacks on cryptography Probing attack on AES In probing attack, an attacker reads sensitive data by attaching a probe to wire in a target chip.  ... 
doi:10.1016/j.mejo.2019.05.017 fatcat:rgnxa7rvj5e5phuncnka2pn24m

WHISPER A Tool for Run-time Detection of Side-Channel Attacks

Maria Mushtaq, Jeremy Bricq, Muhammad Khurram Bhatti, Ayaz Akram, Vianney Lapotre, Guy Gogniat, Pascal Benoit
2020 IEEE Access  
We present experimental evaluation of WHISPER against Flush+Reload, Flush+Flush, Prime+Probe, Spectre and Meltdown attacks.  ...  High resolution and stealthy attacks and their variants such as Flush+Reload, Flush+Flush, Prime+Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's computing architecture  ...  We provide results for multiple attacks, namely: Flush+Reload on AES, Flush+Flush on AES half-key (FF_Imp1), Flush+Flush on AES full-key (FF_Imp2), Prime+Probe on AES half-key (FF_Imp1), Prime+Probe on  ... 
doi:10.1109/access.2020.2988370 fatcat:a7lzt2gq3jbgzcggvnzdnzvaba

CacheZoom: How SGX Amplifies the Power of Cache Attacks [chapter]

Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
2017 Lecture Notes in Computer Science  
In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements.  ...  As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios.  ...  A software AES implementation can be executed in a few hundred cycles, while a Prime+Probe cycle on the LLC takes about 2000 cycles to monitor a single set.  ... 
doi:10.1007/978-3-319-66787-4_4 fatcat:xfy45opwize3jmdwuox5ydcy6i

Protecting cryptographic integrated circuits with side-channel information

Makoto Nagata, Daisuke Fujimoto, Noriyuki Miura, Naofumi Homma, Yu-ichi Hayashi, Kazuo Sakiyama
2017 IEICE Electronics Express  
Side-channel attacks have emerged as the nondestructive threats of security vulnerability in cryptographic hardware.  ...  This paper provides an overview of the protection techniques with counter ways of utilizing sidechannel information leakage for combatting side-channel attacks as well as securing the authenticity of devices  ...  The attacker can proximately place a micro EM probe over the die area, as depicted in Fig. 5 . The EM waves emanated from the PDN can be sensed by a tiny one-turn coil through magnetic coupling.  ... 
doi:10.1587/elex.14.20162005 fatcat:r7tde5cp4rgbncku7umezsphfm
« Previous Showing results 1 — 15 out of 18,622 results