当前位置: X-MOL 学术Microelectron. J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Template attacks on ECC implementations using performance counters in CPU
Microelectronics Journal ( IF 1.9 ) Pub Date : 2020-11-05 , DOI: 10.1016/j.mejo.2020.104935
B. Asvija , R. Eswari , M.B. Bijoy

We demonstrate a new set of template attacks on ECC implementations using the performance counters in CPU. Template attacks are powerful mechanisms that can combine statistical intelligence for modelling side channel leakages and can thus compromise complex crypto implementations. Automated attack phases add to the efficiency of this approach. We introduce a new approach of using CPU counter values for constructing templates to carry out attacks on crypto implementations, which also opens up the possibility of many other template attacks that have been demonstrated earlier using power analysis, to be feasible on the modern day architectures. The values obtained from multiple CPU counters are used to generate templates, which are further matched with the traces obtained on the target implementation for guessing the bit values of the secret scalar used during the scalar multiplication function of the ECC implementation. We demonstrate the feasibility of the attack approach on virtualized environments such as the resources of the cloud computing infrastructure. We further model the attack, define the evaluation metrics and demonstrate the effectiveness of the attack approach.



中文翻译:

使用CPU中的性能计数器对ECC实现进行模板攻击

我们使用CPU中的性能计数器演示了对ECC实现的一组新的模板攻击。模板攻击是强大的机制,可以结合统计智能来对侧信道泄漏进行建模,从而危及复杂的加密实现。自动化攻击阶段可提高此方法的效率。我们介绍了一种使用CPU计数器值来构造模板以对加密实现进行攻击的新方法,这也为现代架构上可行的其他许多模板攻击提供了可能性,这些攻击早先已使用功耗分析进行了演示。从多个CPU计数器获得的值用于生成模板,它们进一步与在目标实现上获得的迹线匹配,以猜测在ECC实现的标量乘法功能期间使用的秘密标量的位值。我们演示了在虚拟环境(例如云​​计算基础架构的资源)上实施攻击方法的可行性。我们进一步对攻击进行建模,定义评估指标并演示攻击方法的有效性。

更新日期:2020-11-13
down
wechat
bug