skip to main content
10.1145/2744769.2744859acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Information leakage chaff: feeding red herrings to side channel attackers

Authors Info & Claims
Published:07 June 2015Publication History

ABSTRACT

A prominent threat to embedded systems security is represented by side-channel attacks: they have proven effective in breaching confidentiality, violating trust guarantees and IP protection schemes. State-of-the-art countermeasures reduce the leaked information to prevent the attacker from retrieving the secret key of the cipher. We propose an alternate defense strategy augmenting the regular information leakage with false targets, quite like chaff countermeasures against radars, hiding the correct secret key among a volley of chaff targets. This in turn feeds the attacker with a large amount of invalid keys, which can be used to trigger an alarm whenever the attack attempts a content forgery using them, thus providing a reactive security measure. We realized a LLVM compiler pass able to automatically apply the proposed countermeasure to software implementations of block ciphers. We provide effectiveness and efficiency results on an AES implementation running on an ARM Cortex-M4 showing performance overheads comparable with state-of-the-art countermeasures.

References

  1. G. Agosta, A. Barenghi, M. Maggi, and G. Pelosi. Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application. In Proc. of 50th DAC, pages 81:1--81:6. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Agosta, A. Barenghi, and G. Pelosi. A Code Morphing Methodology to Automate Power Analysis Countermeasures. In Proc. of 49th DAC, pages 77--82, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Agosta, A. Barenghi, G. Pelosi, and M. Scandale. A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software. In Proc. of 51st DAC, pages 1--6, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. M. Bowen, S. Hershkop, A. D. Keromytis, and S. J. Stolfo. Baiting Inside Attackers Using Decoy Documents. In Proc. of SecureComm '09, pages 51--70, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Coron. Higher order masking of look-up tables. In Proc. EUROCRYPT, pages 441--458, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  6. T. Eisenbarth et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Proc. of 28th CRYPTO, pages 203--220, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Goodwill, B. Jun, J. Jaffe, and P. Rohatgi. A Testing Methodology for Side-Channel Resistance Validation. In Proc. of NIST Non-Invasive Attack Testing Workshop, 2011.Google ScholarGoogle Scholar
  8. J. Heyszl et al. Localized Electromagnetic Analysis of Cryptographic Implementations. In CT-RSA, pages 231--244, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Juels and T. Ristenpart. Honey Encryption: Security Beyond the Brute-Force Bound. In Proc. EUROCRYPT, pages 293--310, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  10. P. C. Kocher, J. Jaffe, B. Jun, and P. Rohatgi. Introduction to Differential Power Analysis. J. Cryptographic Engineering, 1(1):5--27, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  11. R. Lumbiarres-Lopez, M. Lopez-Garcia, and E. Canto. Implementation on MicroBlaze of AES Algorithm to Reveal Fake Keys against Side-Channel Attacks. In Proc. of 23rd ISIE, pages 1882--1887, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, 2007. Google ScholarGoogle Scholar
  13. A. Moradi, A. Barenghi, T. Kasper, and C. Paar. On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks: Extracting Keys from Xilinx Virtex-II FPGAs. In Proc. of 18th CCS, pages 111--124, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Stoll. Stalking the Wily Hacker. Commun. ACM, 31(5):484--497, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information leakage chaff: feeding red herrings to side channel attackers

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DAC '15: Proceedings of the 52nd Annual Design Automation Conference
        June 2015
        1204 pages
        ISBN:9781450335201
        DOI:10.1145/2744769

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 June 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,770of5,499submissions,32%

        Upcoming Conference

        DAC '24
        61st ACM/IEEE Design Automation Conference
        June 23 - 27, 2024
        San Francisco , CA , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader