Abhijitt Dhavlle, Raj Mehta, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao
{"title":"熵盾:基于时间的边信道攻击的边信道熵最大化","authors":"Abhijitt Dhavlle, Raj Mehta, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao","doi":"10.1109/ISQED48828.2020.9137008","DOIUrl":null,"url":null,"abstract":"The hardware systems have experienced a plethora of side-channel attacks (SCAs) in recent years with cache-based SCAs being one of the dominant threats. The SCAs exploit the architectural caveats, which invariably leak essential information during an application's execution. Shutting down the side-channels is not a feasible approach due to various restrictions, such as architectural changes and complexity. To overcome such concerns and protect the data integrity, we introduce Entropy-Shield in this work. The proposed Entropy-Shield aims to maximize the entropy in the leaked side-channel information rather than attempting to close the side-channels. To achieve this, the proposed Entropy-Shield introduces carefully and sensibly crafted perturbations into the victim application, thereby increasing the entropy of the information obtained by the attacker to deduce the secret key, while the information being observed looks legit yet futile. This methodology has been successfully tested on cache targeted SCAs such as Flush+Reload and Flush+Flush and the key information retrieved by the attacker is shown to be ultimately futile, indicating the success of proposed Entropy-Shield.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks\",\"authors\":\"Abhijitt Dhavlle, Raj Mehta, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao\",\"doi\":\"10.1109/ISQED48828.2020.9137008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The hardware systems have experienced a plethora of side-channel attacks (SCAs) in recent years with cache-based SCAs being one of the dominant threats. The SCAs exploit the architectural caveats, which invariably leak essential information during an application's execution. Shutting down the side-channels is not a feasible approach due to various restrictions, such as architectural changes and complexity. To overcome such concerns and protect the data integrity, we introduce Entropy-Shield in this work. The proposed Entropy-Shield aims to maximize the entropy in the leaked side-channel information rather than attempting to close the side-channels. To achieve this, the proposed Entropy-Shield introduces carefully and sensibly crafted perturbations into the victim application, thereby increasing the entropy of the information obtained by the attacker to deduce the secret key, while the information being observed looks legit yet futile. This methodology has been successfully tested on cache targeted SCAs such as Flush+Reload and Flush+Flush and the key information retrieved by the attacker is shown to be ultimately futile, indicating the success of proposed Entropy-Shield.\",\"PeriodicalId\":225828,\"journal\":{\"name\":\"2020 21st International Symposium on Quality Electronic Design (ISQED)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 21st International Symposium on Quality Electronic Design (ISQED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISQED48828.2020.9137008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 21st International Symposium on Quality Electronic Design (ISQED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISQED48828.2020.9137008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
The hardware systems have experienced a plethora of side-channel attacks (SCAs) in recent years with cache-based SCAs being one of the dominant threats. The SCAs exploit the architectural caveats, which invariably leak essential information during an application's execution. Shutting down the side-channels is not a feasible approach due to various restrictions, such as architectural changes and complexity. To overcome such concerns and protect the data integrity, we introduce Entropy-Shield in this work. The proposed Entropy-Shield aims to maximize the entropy in the leaked side-channel information rather than attempting to close the side-channels. To achieve this, the proposed Entropy-Shield introduces carefully and sensibly crafted perturbations into the victim application, thereby increasing the entropy of the information obtained by the attacker to deduce the secret key, while the information being observed looks legit yet futile. This methodology has been successfully tested on cache targeted SCAs such as Flush+Reload and Flush+Flush and the key information retrieved by the attacker is shown to be ultimately futile, indicating the success of proposed Entropy-Shield.