Filters








33,629 Hits in 4.0 sec

Exploiting the Difference of Side-Channel Leakages [chapter]

Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard
2012 Lecture Notes in Computer Science  
In this paper, we propose a setup that improves the performance of implementation attacks by exploiting the difference of sidechannel leakages.  ...  The main idea of our setup is to use two cryptographic devices and to measure the difference of their physical leakages, e.g., their power consumption.  ...  number P22241-N23 (Investigation of Implementation Attacks -IIA).  ... 
doi:10.1007/978-3-642-29912-4_1 fatcat:n6t6fsb6nnftxjriszvvjgvv2y

Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations [chapter]

Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2014 Lecture Notes in Computer Science  
Side-channel attacks on secret exponents are typically bound to the leakage of single executions because of cryptographic protocols or side-channel countermeasures such as blinding.  ...  the signal-to-noise ratio of available leakage.  ...  We refer to the side-channel information about different bits which can be collected from one execution of an exponentiation as single-execution side-channel leakage.  ... 
doi:10.1007/978-3-319-08302-5_6 fatcat:3cgzogdss5ei5pr7eee5z2wcpi

Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations [chapter]

Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2014 Lecture Notes in Computer Science  
Side-channel attacks on secret exponents are typically bound to the leakage of single executions because of cryptographic protocols or side-channel countermeasures such as blinding.  ...  the signal-to-noise ratio of available leakage.  ...  We refer to the side-channel information about different bits which can be collected from one execution of an exponentiation as single-execution side-channel leakage.  ... 
doi:10.1007/978-3-319-14123-7_6 fatcat:sxv4eufmijg7vhyoi2um2ceobi

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices [chapter]

François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede
2009 Lecture Notes in Computer Science  
We finally describe a new (but highly inspired from previous ones) statistical test to exploit side-channel leakages. ⋆  ...  Additionally, we suggest an informal classification of side-channel distinguishers that underlines the similarities between different attacks.  ...  Side-channel adversary The present analysis aims to compare different statistical tests for side-channel attacks. But statistical tests are only a part of a side-channel adversary.  ... 
doi:10.1007/978-3-642-00730-9_16 fatcat:d3qjjtlqwvctpaqh7up3asegt4

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA [chapter]

Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2009 Lecture Notes in Computer Science  
Our results exhibit that algebraic techniques lead to a new understanding of implementation weaknesses that is different than classical side-channel attacks.  ...  Namely, algebraic side-channel attacks can recover the AES master key with the observation of a single encrypted plaintext and they easily deal with unknown plaintexts/ciphertexts in this context.  ...  By exploiting the leakages in all the cipher rounds, algebraic side-channel attacks also get rid of the computational limitations of classical DPA in which enumerating key candidates is necessary.  ... 
doi:10.1007/978-3-642-04138-9_8 fatcat:nbkyzlyqfvdrxeeoyeg6s4m2sa

Introduction to Side-Channel Attacks [chapter]

François-Xavier Standaert
2009 Integrated Circuits and Systems  
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the midnineties.  ...  It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices.  ...  Finally, we list a number of countermeasures to reduce the impact of physical information leakages. 2 Basics of side-channel attacks Origin of the leakages Side-channel attacks are closely related to  ... 
doi:10.1007/978-0-387-71829-3_2 fatcat:z7gvobbxwzaypk2jhhgri5jki4

Analysis and countermeasures to side-channel attacks: a hardware design perspective

Davide Zoni
2019 2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)  
Second, we discuss the variations in the observability of the side-channel information leakage at post-synthesis and post-implementation levels of the FPGA hardware design flow.  ...  Starting from an FPGA implementation of the open-hardware ORPSoC system-on-chip running a software version of the AES, this paper explores two implications of the side-channel information leakage that  ...  Microarchitectural components inducing side-channel information leakage -To expose the side-channel information leakage caused by microarchitectural CPU modules, we employed two different sequences of  ... 
doi:10.1109/recosoc48741.2019.9034935 dblp:conf/recosoc/Zoni19 fatcat:m3yxtqrf2bfltnjtonbkroprzi

Non-Linear Collision Analysis [chapter]

Xin Ye, Cong Chen, Thomas Eisenbarth
2014 Lecture Notes in Computer Science  
Due to the advancement of chip technology, the nature of side channel leakage becomes hard to characterize with a fixed leakage model.  ...  In this work, a new non-linear collision attack is proposed in the pursuit of the side channel distinguishers with minimal assumption of leakage behavior.  ...  We would like to thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1007/978-3-319-13066-8_13 fatcat:oqrgntkw5ngj5eny47rkx3kkou

Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities [article]

Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique
2021 arXiv   pre-print
The focus of this paper is to analyze the hardware-exploitable side-channel attack using power consumption and software-exploitable side-channel attacks to manipulate cache.  ...  In this paper, we present a brief yet comprehensive study of the security vulnerabilities in modern microprocessors with respect to side-channel attacks and their respective mitigation techniques.  ...  ACKNOWLEDGMENT This work was partially supported by Doctoral College Resilient Embedded Systems which is run jointly by TU Wien's Faculty of Informatics and FH-Technikum Wien.  ... 
arXiv:2106.08877v1 fatcat:zdalqpzvajatjhvu4ik7ccvwky

Soft Analytical Side-Channel Attacks [chapter]

Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2014 Lecture Notes in Computer Science  
the optimal data complexity of algebraic side-channel attacks.  ...  The resulting soft analytical side-channel attacks work under the same profiling assumptions as template attacks, and directly exploit the vectors of probabilities produced by these attacks.  ...  François-Xavier Standaert is a research associate of the Belgian Fund for Scientific Research (FNRS-F.R.S.).  ... 
doi:10.1007/978-3-662-45611-8_15 fatcat:qnktxequ4ngh7mvl6j46mdllty

A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security

John Demme, Robert Martin, Adam Waksman, Simha Sethumadhavan
2013 IEEE Micro  
Side-channel exploits affect a variety of important domains.  ...  Documented side-channel attacks offer existence proofs of exploitable vulnerabilities, but they should also be considered as symptoms of a deeper problem.  ...  Side-channel exploits affect a variety of important domains.  ... 
doi:10.1109/mm.2013.23 fatcat:3l6idf5w3rbe3gg32vhiaigxfa

Side-Channel Leakage Detection with One-Way Analysis of Variance

Wei Yang, Anni Jia, Liguo Zhang
2021 Security and Communication Networks  
In accordance with the relevance between leakage points and inputs of a cryptographic algorithm, the proposed method divides side-channel samples into multiple classes and tests the difference among these  ...  Side-channel analysis (SCA) is usually used for security evaluation to test the side-channel vulnerability of a cryptographic device.  ...  Acknowledgments is work was supported in part by National Natural Science Foundation of China (nos. 61802186, 61472189, 61572255, and 62002167).  ... 
doi:10.1155/2021/6614702 fatcat:kd7n2lra2rhdpkjbeyb73ve2vq

The Temperature Side Channel and Heating Fault Attacks [chapter]

Michael Hutter, Jörn-Marc Schmidt
2014 Lecture Notes in Computer Science  
In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel-a side channel that has been widely cited in literature but not well characterized yet.  ...  Agrawal [9] who exploited the fact that PC keyboards emanate different sounds that can be recognized at a distance. Improvements of the latter attack were reported by L. Zhuan et al. [10] in 2009.  ...  grant number TRP251-N23 (Realizing a Secure Internet of Things -ReSIT), and the European Cooperation in Science and Technology (COST) Action IC1204 (Trustworthy Manufacturing and Utilization of Secure  ... 
doi:10.1007/978-3-319-08302-5_15 fatcat:yhx5yzzb2jgappca6u7cx2nvau

The Temperature Side Channel and Heating Fault Attacks [chapter]

Michael Hutter, Jörn-Marc Schmidt
2014 Lecture Notes in Computer Science  
In this paper, we present practical results of data leakages of CMOS devices via the temperature side channel-a side channel that has been widely cited in literature but not well characterized yet.  ...  Agrawal [9] who exploited the fact that PC keyboards emanate different sounds that can be recognized at a distance. Improvements of the latter attack were reported by L. Zhuan et al. [10] in 2009.  ...  grant number TRP251-N23 (Realizing a Secure Internet of Things -ReSIT), and the European Cooperation in Science and Technology (COST) Action IC1204 (Trustworthy Manufacturing and Utilization of Secure  ... 
doi:10.1007/978-3-319-14123-7_15 fatcat:t3u6frhnvnda7cgdof5vptnxsa

Algebraic Side-Channel Attacks [chapter]

Mathieu Renauld, François-Xavier Standaert
2010 Lecture Notes in Computer Science  
Eventually, we argue that algebraic side-channel attacks can take advantage of any kind of physical leakage, leading to a new tradeoff between the robustness and informativeness of the side-channel information  ...  The proposed attacks have a number of interesting features: (1) they exploit the information leakages of all the cipher rounds, (2) in common implementation contexts (e.g. assuming a Hamming weight leakage  ...  A second question is to improve and optimize the different parts of an algebraic side-channel attack.  ... 
doi:10.1007/978-3-642-16342-5_29 fatcat:irtzopceczdh7gbrt7zvjd52g4
« Previous Showing results 1 — 15 out of 33,629 results