To defeat side-channel attacks, many recent countermeasures work by enforcing random runtime variability to the target computing platform in terms of clock jitters, frequency, and voltage scaling, and phase shift, also combining the contributions from different actuators to maximize the side-channel resistance of the target. However, the robustness of such solutions seems strongly influenced by several hyper-parameters for which an in-depth analysis is still missing. This work proposes a fine-grained dynamic voltage and frequency scaling actuator to investigate the effectiveness of recent desynchronization countermeasures with the goal of highlighting the link between the enforced runtime variability and the vulnerability to side-channel attacks of cryptographic implementations targeting FPGAs. The analysis of the results collected from real hardware allowed for a comprehensive understanding of the protection offered by runtime variability countermeasures against side-channel attacks.

The Impact of Run-Time Variability on Side-Channel Attacks Targeting FPGAs

Galli, Davide;Guarisco, Adriano;Fornaciari, William;Matteucci, Matteo;Zoni, Davide
2024-01-01

Abstract

To defeat side-channel attacks, many recent countermeasures work by enforcing random runtime variability to the target computing platform in terms of clock jitters, frequency, and voltage scaling, and phase shift, also combining the contributions from different actuators to maximize the side-channel resistance of the target. However, the robustness of such solutions seems strongly influenced by several hyper-parameters for which an in-depth analysis is still missing. This work proposes a fine-grained dynamic voltage and frequency scaling actuator to investigate the effectiveness of recent desynchronization countermeasures with the goal of highlighting the link between the enforced runtime variability and the vulnerability to side-channel attacks of cryptographic implementations targeting FPGAs. The analysis of the results collected from real hardware allowed for a comprehensive understanding of the protection offered by runtime variability countermeasures against side-channel attacks.
2024
Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems
DVFS
FPGA
runtime variability
side-channel attacks
File in questo prodotto:
File Dimensione Formato  
2409.01881v2.pdf

accesso aperto

: Pre-Print (o Pre-Refereeing)
Dimensione 263.9 kB
Formato Adobe PDF
263.9 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/1285805
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 0
social impact