SoK: Design Tools for Side-Channel-Aware Implementions

04/17/2021
by   Ileana Buhan, et al.
0

Side-channel attacks that leak sensitive information through a computing device's interaction with its physical environment have proven to be a severe threat to devices' security, particularly when adversaries have unfettered physical access to the device. Traditional approaches for leakage detection measure the physical properties of the device. Hence, they cannot be used during the design process and fail to provide root cause analysis. An alternative approach that is gaining traction is to automate leakage detection by modeling the device. The demand to understand the scope, benefits, and limitations of the proposed tools intensifies with the increase in the number of proposals. In this SoK, we classify approaches to automated leakage detection based on the model's source of truth. We classify the existing tools on two main parameters: whether the model includes measurements from a concrete device and the abstraction level of the device specification used for constructing the model. We survey the proposed tools to determine the current knowledge level across the domain and identify open problems. In particular, we highlight the absence of evaluation methodologies and metrics that would compare proposals' effectiveness from across the domain. We believe that our results help practitioners who want to use automated leakage detection and researchers interested in advancing the knowledge and improving automated leakage detection.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/10/2018

Is Leakage Power a Linear Function of Temperature?

In this work, we present a study of the leakage power modeling technique...
research
12/11/2019

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

Since their introduction over two decades ago, physical side-channel att...
research
11/30/2022

Quantitative Information Flow for Hardware: Advancing the Attack Landscape

Security still remains an afterthought in modern Electronic Design Autom...
research
12/20/2020

Concrete Evaluation of the Random Probing Security

We study masked implementations' security when the adversary can randoml...
research
06/09/2021

Information flow based defensive chain for data leakage detection and prevention: a survey

Mobile and IoT applications have greatly enriched our daily life by prov...
research
01/21/2020

Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices

Along with the benefits of Internet of Things (IoT) come potential priva...
research
03/10/2022

TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model

Confidentiality of the data is being endangered as it has been categoriz...

Please sign up or login with your details

Forgot password? Click here to reset