{"title":"基于重键的移动目标侧信道攻击防御机制","authors":"Satyanarayana Vuppala, A. Mady, Adam Kuenzi","doi":"10.1109/GIOTS.2019.8766426","DOIUrl":null,"url":null,"abstract":"In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks\",\"authors\":\"Satyanarayana Vuppala, A. Mady, Adam Kuenzi\",\"doi\":\"10.1109/GIOTS.2019.8766426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.\",\"PeriodicalId\":149504,\"journal\":{\"name\":\"2019 Global IoT Summit (GIoTS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Global IoT Summit (GIoTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GIOTS.2019.8766426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Global IoT Summit (GIoTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GIOTS.2019.8766426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks
In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.