A Study on Analyzing Side-Channel Resistant Encoding Schemes with Respect to Fault Attacks

Recently, several software encoding countermeasures were proposed, utilizing the side-channel hiding concept for software implementations. While these schemes aim to protect the underlying code against various leakage models, they can also be utilized against fault injection attacks to some extent....

全面介紹

Saved in:
書目詳細資料
Main Authors: Breier, Jakub, Jap, Dirmanto, Bhasin, Shivam
其他作者: School of Physical and Mathematical Sciences
格式: Article
語言:English
出版: 2018
主題:
在線閱讀:https://hdl.handle.net/10356/88769
http://hdl.handle.net/10220/44735
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Recently, several software encoding countermeasures were proposed, utilizing the side-channel hiding concept for software implementations. While these schemes aim to protect the underlying code against various leakage models, they can also be utilized against fault injection attacks to some extent. This property comes from the data redundancy that is being employed in order to equalize the leakage. In this work, we analyze three different software encoding schemes with respect to fault injection attacks. We use a custom-made code analyzer to check the vulnerabilities in the assembly code, and we experimentally support our results using laser fault injection technique. Our results show that implementations based on table lookup operations provide reasonable security margin and thwart fault propagation.