{"title":"Use of Simulators for Side-Channel Analysis","authors":"Nikita Veshchikov, S. Guilley","doi":"10.1109/EuroSP.2017.31","DOIUrl":null,"url":null,"abstract":"Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is three-fold. We present a first survey of existing simulators that were build for side-channel analysis. We present a new open-source simulator SAVRASCA that can generate simulated power traces based on compiled binary files for many popular AVR microcontrollers. We show how to use our simulator on the example of DPA Contest 4 and we find a new vulnerability that allows an attacker to mount a differential power analysis (or even simple electro-magnetic analysis) attack on the scheme. Our simulator can be used during development of new products in order to test their resistance against side-channel analysis. We also focus the attention of readers on questions of why and how simulators are useful in this domain and try to highlight main issues related to simulators that were developed by the community.","PeriodicalId":233564,"journal":{"name":"2017 IEEE European Symposium on Security and Privacy (EuroS&P)","volume":"53 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE European Symposium on Security and Privacy (EuroS&P)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSP.2017.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is three-fold. We present a first survey of existing simulators that were build for side-channel analysis. We present a new open-source simulator SAVRASCA that can generate simulated power traces based on compiled binary files for many popular AVR microcontrollers. We show how to use our simulator on the example of DPA Contest 4 and we find a new vulnerability that allows an attacker to mount a differential power analysis (or even simple electro-magnetic analysis) attack on the scheme. Our simulator can be used during development of new products in order to test their resistance against side-channel analysis. We also focus the attention of readers on questions of why and how simulators are useful in this domain and try to highlight main issues related to simulators that were developed by the community.