Side channel attacks extract a secret from a computing device modeling its secret-dependent behavior, either with a synthetic model, or profiling an instance of the design under attack. We propose a countermeasure based on temporal interleaving, improving on the current ones by making the profiled models of a device non portable, while also providing first-order resistance to synthetic model attacks. Our design compares favorably with alternative solutions in the resource consumption and timing metrics. We evaluate the security of the design against both profiled attacks with feature reduction techniques under a single and multi-device model, and first-order non profiled attacks.
A Non Profiled and Profiled Side Channel Attack Countermeasure through Computation Interleaving
Isabella Piacentini;Alessandro Barenghi;Gerardo Pelosi
2023-01-01
Abstract
Side channel attacks extract a secret from a computing device modeling its secret-dependent behavior, either with a synthetic model, or profiling an instance of the design under attack. We propose a countermeasure based on temporal interleaving, improving on the current ones by making the profiled models of a device non portable, while also providing first-order resistance to synthetic model attacks. Our design compares favorably with alternative solutions in the resource consumption and timing metrics. We evaluate the security of the design against both profiled attacks with feature reduction techniques under a single and multi-device model, and first-order non profiled attacks.File | Dimensione | Formato | |
---|---|---|---|
main.pdf
accesso aperto
:
Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione
2.23 MB
Formato
Adobe PDF
|
2.23 MB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.