skip to main content
10.1145/3605098.3635997acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks

Published: 21 May 2024 Publication History

Abstract

How to efficiently prevent side-channel attacks (SCAs) on cryptographic implementations and devices has become an important problem in recent years. One of the widely used countermeasures to combat power consumption based SCAs is to inject indiscriminate random noise sequences into the raw leakage traces. However, this method leads to significant increases in the energy consumption which is unaffordable cost for battery powered devices, and ways must be found to reduce the amount of energy in noise generation while keeping the side-channel invisible. In this paper, we propose a practical approach of energy efficient noise generation to prevent SCAs. We first take advantage of sparsity of the information in the leakage traces, and prove the existence of energy efficient noise generation that is optimized in the side channel protection under a given energy consumption budget, and also provide the optimal solution. Compared to the previous approach that also focuses on the energy efficiency, our solution is applicable to all general categories of compression methods. Furthermore, we also propose a practical noise generator design by aggregating the noise generation patterns under a variety of compression methods from different categories. As a result, the method presented in this paper is practically more applicable than previous one. The experimental results also validate the effectiveness of our proposed scheme.

References

[1]
Cédric Archambeau, Eric Peeters, François-Xavier Standaert, and Jean-Jacques Quisquater. 2006. Template Attacks in Principal Subspaces. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'06). Springer, 1--14.
[2]
Ryad Benadjila, Emmanuel Prouff, Remi Strullu, Eleonora Cagli, and Cecile Dumas. 2020. Deep Learning for Side-Channel Analysis and Introduction to ASCAD Database. Journal of Cryptographic Engineering 10 (2020), 163--188.
[3]
Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'04). Springer, 16--29.
[4]
S. Chari, J. R Rao, and P. Rohatgi. 2003. Template Attacks. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'03). Springer, 13--28.
[5]
Wei Cheng, Yi Liu, Sylvain Guilley, and Olivier Rioul. 2022. Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. In 2022 IEEE International Symposium on Information Theory (ISIT'22). IEEE, 654--659.
[6]
Marios O. Choudary and Markus G. Kuhn. 2013. Efficient template attacks. In International Conference on Smart Card Research and Advanced Applications (CARDIS'13). Springer, 253--270.
[7]
Marios O. Choudary and Markus G. Kuhn. 2018. Efficient, Portable Template Attacks. IEEE Transactions on Information Forensics and Security 13, 2 (2018), 490--501.
[8]
Éloi de Chérisey, Sylvain Guilley, Olivier Rioul, and Pablo Piantanida. 2019. An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware. In 2019 IEEE International Symposium on Information Theory (ISIT'19). IEEE, 310--315.
[9]
Thomas M. Cover and Joy A. Thomas. 2006. Elements of Information Theory. John Wiley & Sons, Inc.
[10]
Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. 2019. X-DeepSCA: Cross-Device Deep Learning Side Channel Attack. In 2019 56th ACM/IEEE Design Automation Conference (DAC'19). ACM, 1--6.
[11]
Debayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. 2017. High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST'17). IEEE, 62--67.
[12]
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, and Pablo Piantanida. 2019. Best Information is Most Successful: Mutual Information and Success Rate in Side-Channel Analysis. In IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES'19), Vol. 2019. Springer, 49--79.
[13]
Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2016. Masking AES with d+1 Shares in Hardware. In International Conference on Cryptographic Hardware and Embedded Systems (CHES'16). Springer, 194--212.
[14]
Julien Doget, Emmanuel Prouff, Matthieu Rivain, and François-Xavier Standaert. 2011. Univariate Side Channel Attacks and Leakage Modeling. Journal of Cryptographic Engineering 1, 2 (2011), 123--144.
[15]
Qiang Fang, Longyang Lin, Yao Zu Wong, Hui Zhang, and Massimo Alioto. 2022. Side-Channel Attack Counteraction via Machine Learning-Targeted Power Compensation for Post-Silicon HW Security Patching. In 2022 IEEE International Solid-State Circuits Conference (ISSCC'22), Vol. 65. IEEE, 1--3.
[16]
Al Faruque, Mohammad Abdullah, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. 2016. Acoustic Side-Channel Attacks on Additive Manufacturing Systems. In Proceedings of the 7th International Conference on Cyber-Physical Systems(ICCPS'16). IEEE, 1--10.
[17]
Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01). Springer, 251--261.
[18]
Benedikt Gierlichs, Kerstin Lemke-Rust, and Christof Paar. 2006. Templates vs. Stochastic Methods. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'06). Springer, 15--29.
[19]
Satashu Goel and Rohit Negi. 2008. Guaranteeing Secrecy using Artificial Noise. IEEE Transactions on Wireless Communications 7, 6 (2008), 2180--2189.
[20]
Andrea Goldsmith, Syed Ali Jafar, Nihar Jindal, and Sriram Vishwanath. 2003. Capacity Limits of MIMO Channels. IEEE Journal on Selected Areas in Communications 21, 5 (2003), 684--702.
[21]
Grizzly. [n. d.]. http://www.cl.cam.ac.uk/research/security/datasets/grizzly/. ([n. d.]).
[22]
Tim Güneysu and Amir Moradi. 2011. Generic Side-Channel Countermeasures for Reconfigurable Devices. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'11). Springer, 33--48.
[23]
Annelie Heuser, Olivier Rioul, and Sylvain Guilley. 2014. Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'14). Springer, 55--74.
[24]
Akira Ito, Rei Ueno, and Naofumi Homma. 2022. On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS'22). ACM, 1521--1535.
[25]
Shan Jin and Riccardo Bettati. 2018. Adaptive Channel Estimation in Side Channel Attacks. In 2018 IEEE International Workshop on Information Forensics and Security (WIFS'18). IEEE, 1--7.
[26]
Shan Jin, Minghua Xu, Riccardo Bettati, and Mihai Christodorescu. 2022. Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel Attacks. In 2022 IEEE International Workshop on Information Forensics and Security (WIFS'22). 1--6.
[27]
Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in cryptology (CRYPTO'99). Springer, Springer, 789--789.
[28]
David B. Levey and Stephen McLaughlin. 2002. The Statistical Nature of Impulse Noise Interarrival Times in Digital Subscriber Loop Systems. Signal Processing 82, 3 (2002), 329--351.
[29]
Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer.
[30]
Iain Mann, Stephen McLaughlin, Werner Henkel, Rob Kirkby, and Thomas Kessler. 2002. Impulse Generation With Appropriate Amplitude, Length, Inter-arrival, and Spectral Characteristics. IEEE Journal on Selected Areas in Communications 20, 5 (2002), 901--912.
[31]
George L. Nemhauser and Laurence A. Wolsey. 1988. Integer and Combinatorial Optimization. Wiley-Interscience.
[32]
Emmanuel Prouff and Matthieu Rivain. 2013. Masking against Side-Channel Attacks: A Formal Security Proof. In 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'13). Springer, 142--159.
[33]
Werner Schindler, Kerstin Lemke, and Christof Paar. 2005. A Stochastic Model for Differential Side Channel Cryptanalysis. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'05). Springer, 30--46.
[34]
Shabnam Shafiee and Sennur Ulukus. 2005. Capacity of Multiple Access Channels with Correlated Jamming. In 2005 IEEE Military Communications Conference'(MILCOM'05), Vol. 1. IEEE, 218--224.
[35]
Adi Shamir. 2000. Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'00). Springer, 1--77.
[36]
François-Xavier Standaert and Cédric Archambeau. 2008. Using Subspace-based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'08). Springer, 411--425.
[37]
François-Xavier Standaert, Tal Malkin, and Moti Yung. 2009. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'09). Springer, 443--461.
[38]
Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, and Michael Muehlberghuber. 2018. Leakage Bounds for Gaussian Side Channels. In International Conference on Smart Card Research and Advanced Applications (CARDIS'18). Springer, 88--104.
[39]
Carolyn Whitnall and Elisabeth Oswald. 2015. Robust Profiling for DPA-Style Attacks. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'15). Springer, 3--21.
[40]
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, and Zhu Wang. 2017. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. In International Conference on Smart Card Research and Advanced Applications (CARDIS'17). Springer, 70--87.

Cited By

View all

Index Terms

  1. Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing
      April 2024
      1898 pages
      ISBN:9798400702433
      DOI:10.1145/3605098
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 May 2024

      Check for updates

      Author Tags

      1. side-channel attacks
      2. artificial noise
      3. energy efficiency
      4. channel capacity

      Qualifiers

      • Research-article

      Conference

      SAC '24
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 23 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media